From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Systematic Evaluation of Transient Execution Attacks and Defenses., , , , , , , , и . CoRR, (2018)Evolution of Defenses against Transient-Execution Attacks., , , и . ACM Great Lakes Symposium on VLSI, стр. 169-174. ACM, (2020)Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks., , , , , , , и . CoRR, (2021)The Evolution of Transient-Execution Attacks., , и . ACM Great Lakes Symposium on VLSI, стр. 163-168. ACM, (2020)Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks., , , , , , , и . ICISSP, стр. 48-59. SCITEPRESS, (2022)ConTExT: Leakage-Free Transient Execution., , , , , и . CoRR, (2019)Automating Seccomp Filter Generation for Linux Applications., , , и . CoRR, (2020)A Systematic Evaluation of Transient Execution Attacks and Defenses., , , , , , , , и . USENIX Security Symposium, стр. 249-266. USENIX Association, (2019)PLATYPUS: Software-based Power Side-Channel Attacks on x86., , , , , , и . SP, стр. 355-371. IEEE, (2021)Specfuscator: Evaluating Branch Removal as a Spectre Mitigation., , , и . Financial Cryptography (1), том 12674 из Lecture Notes in Computer Science, стр. 293-310. Springer, (2021)