Author of the publication

Iso-X: A Flexible Architecture for Hardware-Managed Isolated Execution.

, , , , , and . MICRO, page 190-202. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Port or Shim? Stress Testing Application Performance on Intel SGX., , and . IISWC, page 123-133. IEEE, (2020)BranchScope: A New Side-Channel Attack on Directional Branch Predictor., , , and . ASPLOS, page 693-707. ACM, (2018)A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks., , , and . HPCA, page 201-212. IEEE Computer Society, (2014)On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters., , , , and . AsiaCCS, page 483-493. ACM, (2017)Hardening extended memory access control schemes with self-verified address spaces., , , , and . ICCAD, page 392-399. IEEE, (2017)Iso-X: A Flexible Architecture for Hardware-Managed Isolated Execution., , , , , and . MICRO, page 190-202. IEEE Computer Society, (2014)DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications., , , , , and . DSN, page 415-426. IEEE Computer Society, (2017)Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring., , , and . ARES, page 74-81. IEEE Computer Society, (2009)DroidNative: Automating and optimizing detection of Android native code malware variants., , , , and . Comput. Secur., (2017)Multi-aspect profiling of kernel rootkit behavior., , and . EuroSys, page 47-60. ACM, (2009)