Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking., , , , , and . RAID, page 527-546. ACM, (2023)Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities., , and . NDSS, The Internet Society, (2017)You Cannot Always Win the Race: Analyzing the LFENCE/JMP Mitigation for Branch Target Injection., , and . CoRR, (2022)FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware., , , , , , , , and . NDSS, The Internet Society, (2022)You Cannot Always Win the Race: Analyzing mitigations for branch target prediction attacks., , and . EuroS&P, page 671-686. IEEE, (2023)RIDL: Rogue In-Flight Data Load., , , , , , , and . IEEE Symposium on Security and Privacy, page 88-105. IEEE, (2019)Fault Injection as an Oscilloscope: Fault Correlation Analysis., , and . IACR Cryptol. ePrint Arch., (2020)Fault Injection as an Oscilloscope: Fault Correlation Analysis., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (1): 192-216 (2021)CrossTalk: Speculative Data Leaks Across Cores Are Real., , , , and . SP, page 1852-1867. IEEE, (2021)Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation., , and . SP, page 1049-1065. IEEE, (2022)