Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories., and . EAI Endorsed Trans. Security Safety, 7 (24): e1 (2021)Diligent TLBs: a mechanism for exploiting heterogeneity in TLB miss behavior., , , and . ICS, page 195-205. ACM, (2019)HMT: A Hardware-Centric Hybrid Bonsai Merkle Tree Algorithm for High-Performance Authentication., , , , and . FPGA, page 52. ACM, (2022)Dolos: Improving the Performance of Persistent Applications in ADR-Supported Secure Memory., , and . MICRO, page 1241-1253. ACM, (2021)Horus: Persistent Security for Extended Persistence-Domain Memory Systems., , and . MICRO, page 1255-1269. IEEE, (2022)PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter., , , , , , , , and . DATE, page 1697-1702. IEEE, (2021)Adaptive Security Support for Heterogeneous Memory on GPUs., , , , and . HPCA, page 213-228. IEEE, (2022)Plutus: Bandwidth-Efficient Memory Security for GPUs., , and . HPCA, page 543-555. IEEE, (2023)Thoth: Bridging the Gap Between Persistently Secure Memories and Memory Interfaces of Emerging NVMs., , and . HPCA, page 94-107. IEEE, (2023)Punchcard: A Practical Red-Zone Based Scheme for Low-Overhead Heap Protection., , , and . HPCC/DSS/SmartCity/DependSys, page 405-414. IEEE, (2021)