Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Customized Instructions for Protection Against Memory Integrity Attacks., , , , , , and . IEEE Embed. Syst. Lett., 10 (3): 91-94 (2018)Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses., and . IACR Cryptology ePrint Archive, (2014)Branch Prediction Attack on Blinded Scalar Multiplication., , , and . IEEE Trans. Computers, 69 (5): 633-648 (2020)On the Amplification of Cache Occupancy Attacks in Randomized Cache Architectures., , , , and . CoRR, (2023)Victims Can Be Saviors: A Machine Learning-based Detection for Micro-Architectural Side-Channel Attacks., , and . ACM J. Emerg. Technol. Comput. Syst., 17 (2): 14:1-14:31 (2021)Exploring Micro-architectural Side-Channel Leakages through Statistical Testing., and . DATE, page 633-636. IEEE, (2021)Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory., , , and . IACR Cryptol. ePrint Arch., (2020)Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel Platforms., and . CHES, volume 9293 of Lecture Notes in Computer Science, page 248-266. Springer, (2015)A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer., , , , and . ACNS (3), volume 14585 of Lecture Notes in Computer Science, page 271-300. Springer, (2024)Rapid detection of rowhammer attacks using dynamic skewed hash tree., , , and . HASP@ISCA, page 7:1-7:8. ACM, (2018)