Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generic and Automated Drive-by GPU Cache Attacks from the Browser., , , , , , and . AsiaCCS, ACM, (2024)Systematic Analysis of Randomization-based Protected Cache Architectures., , , and . SP, page 987-1002. IEEE, (2021)Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels., , , , , , , and . USENIX Security Symposium, page 7285-7302. USENIX Association, (2023)Fallout: Leaking Data on Meltdown-resistant CPUs., , , , , , , , , and 2 other author(s). CCS, page 769-784. ACM, (2019)Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks., , , , , , and . SP, page 2273-2287. IEEE, (2023)Store-to-Leak Forwarding: Leaking Data on Meltdown-resistant CPUs., , , and . CoRR, (2019)ScatterCache: Thwarting Cache Attacks via Cache Set Randomization., , , , , and . USENIX Security Symposium, page 675-692. USENIX Association, (2019)Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX., , , , and . USENIX Security Symposium, page 3111-3127. USENIX Association, (2022)