Author of the publication

Efficiently Hardening SGX Enclaves against Memory Access Pattern Attacks via Dynamic Program Partitioning.

, , , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recognition of radar signals based on AF grids and geometric shape constraint., , , and . Signal Process., (2019)A Driver's Physiology Sensor-Based Driving Risk Prediction Method for Lane-Changing Process Using Hidden Markov Model., , , , and . Sensors, 19 (12): 2670 (2019)Pandiagonal Magic Squares., and . COCOON, volume 959 of Lecture Notes in Computer Science, page 388-391. Springer, (1995)Grand challenge: implementation by frequently emitting parallel windows and user-defined aggregate functions., , , , and . DEBS, page 325-330. ACM, (2013)Coalesced TLB to Exploit Diverse Contiguity of Memory Mapping., , , , and . CoRR, (2019)Study on the Binding Rate of Oral Drugs with Pepsin and Trypsin, , and . Advances in Biochemistry and Biotechnology, 7 (02): 8 (20 May 20 May, 2019)Learning Discriminative 3D Shape Representations by View Discerning Networks., , , , and . CoRR, (2018)Badness Information Audit Based on Image Character Filtering., , , , and . ISPA Workshops, volume 3759 of Lecture Notes in Computer Science, page 647-656. Springer, (2005)NISD: A Framework for Automatic Narrow Instruction Set Design., , and . ICESS, volume 4523 of Lecture Notes in Computer Science, page 271-282. Springer, (2007)CVP: an energy-efficient indirect branch prediction with compiler-guided value pattern., , , and . ICS, page 111-120. ACM, (2012)