Author of the publication

SMoTherSpectre: Exploiting Speculative Execution through Port Contention.

, , , , , , and . ACM Conference on Computer and Communications Security, page 785-800. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SMoTherSpectre: Exploiting Speculative Execution through Port Contention., , , , , , and . ACM Conference on Computer and Communications Security, page 785-800. ACM, (2019)Reconciling Security and Functional Requirements in Multi-tenant Clouds., , , and . SCC@AsiaCCS, page 11-18. ACM, (2017)ANDRUBIS - 1, 000, 000 Apps Later: A View on Current Android Malware Behaviors., , , , , and . BADGERS@ESORICS, page 3-17. IEEE, (2014)Lobotomy: An Architecture for JIT Spraying Mitigation., , , and . ARES, page 50-58. IEEE Computer Society, (2014)FORECAST: skimming off the malware cream., , , and . ACSAC, page 11-20. ACM, (2011)The BORG: Nanoprobing Binaries for Buffer Overreads., , , and . CODASPY, page 87-97. ACM, (2015)Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations., , , and . USENIX Security Symposium, page 49-64. USENIX Association, (2013)MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis., , and . COMPSAC, page 422-433. IEEE Computer Society, (2015)A Static, Packer-Agnostic Filter to Detect Similar Malware Samples., , , , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 102-122. Springer, (2012)AndRadar: Fast Discovery of Android Applications in Alternative Markets., , , , , , , , and . DIMVA, volume 8550 of Lecture Notes in Computer Science, page 51-71. Springer, (2014)