From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploiting the Trust Between Boundaries: Discovering Memory Corruptions in Printers via Driver-Assisted Testing., , , , , , , , , и . LCTES, стр. 74-84. ACM, (2020)A Case for Protecting Computer Games With SGX., и . SysTEX@Middleware, стр. 4:1-4:6. ACM, (2016)A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions., , и . ACM Comput. Surv., 48 (1): 10:1-10:33 (2015)SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants., , , , , и . USENIX Security Symposium, стр. 895-912. USENIX Association, (2020)SGX-Log: Securing System Logs With SGX., , , и . AsiaCCS, стр. 19-30. ACM, (2017)Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics., , и . NDSS, The Internet Society, (2018)Do Head-Mounted Augmented Reality Devices Affect Muscle Activity and Eye Strain of Utility Workers Who Do Procedural Work? Studies of Operators and Manhole Workers., , , , , и . Hum. Factors, 64 (2): 305-323 (2022)Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults., , , и . RAID, том 10453 из Lecture Notes in Computer Science, стр. 357-380. Springer, (2017)You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps., , , , , и . USENIX Security Symposium, стр. 657-690. USENIX Association, (2015)SGXElide: enabling enclave code secrecy via self-modification., , , и . CGO, стр. 75-86. ACM, (2018)