Author of the publication

CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.

, , , , and . USENIX Security Symposium, page 117-130. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SANCTUARY: ARMing TrustZone with User-space Enclaves., , , , and . NDSS, The Internet Society, (2019)OS-level Software & Hardware Attacks and Defenses.. PhD Forum@MobiSys, page 7-8. ACM, (2018)RIP-RH: Preventing Rowhammer-based Inter-Process Attacks., , , , and . AsiaCCS, page 561-572. ACM, (2019)FastKitten: Practical Smart Contracts on Bitcoin., , , , , , , and . USENIX Security Symposium, page 801-818. USENIX Association, (2019)V0LTpwn: Attacking x86 Processor Integrity from Software., , , , and . USENIX Security Symposium, page 1445-1461. USENIX Association, (2020)BinRec: dynamic binary lifting and recompilation., , , , , , , , , and 2 other author(s). EuroSys, page 36:1-36:16. ACM, (2020)A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing., , , , and . ESEC/SIGSOFT FSE, page 821-831. ACM, (2023)V0LTpwn: Attacking x86 Processor Integrity from Software., , , , and . CoRR, (2019)HardFails: Insights into Software-Exploitable Hardware Bugs., , , , , , , , and . USENIX Security Symposium, page 213-230. USENIX Association, (2019)PKRU-safe: automatically locking down the heap between safe and unsafe languages., , , , , , , , and . EuroSys, page 132-148. ACM, (2022)