From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

NetSpectre: Read Arbitrary Memory over Network., , , , и . ESORICS (1), том 11735 из Lecture Notes in Computer Science, стр. 279-299. Springer, (2019)How Trusted Execution Environments Fuel Research on Microarchitectural Attacks., и . IEEE Secur. Priv., 18 (5): 18-27 (2020)Software-basierte Mikroarchitekturangriffe.. Ausgezeichnete Informatikdissertationen, том D-18 из LNI, GI, (2017)Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches., , и . USENIX Security Symposium, стр. 897-912. USENIX Association, (2015)Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks., , , , , , , и . CoRR, (2021)PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks., , , , , и . DSN, стр. 95-108. IEEE, (2023)Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks., , и . USENIX Security Symposium, стр. 4147-4164. USENIX Association, (2022)Rapid Prototyping for Microarchitectural Attacks., , , и . USENIX Security Symposium, стр. 3861-3877. USENIX Association, (2022)ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture., , , , , и . USENIX Security Symposium, стр. 3917-3934. USENIX Association, (2022)The Evolution of Transient-Execution Attacks., , и . ACM Great Lakes Symposium on VLSI, стр. 163-168. ACM, (2020)