Author of the publication

A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing.

, , , , and . ESEC/SIGSOFT FSE, page 821-831. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Technological Steps toward a Software Component Industry.. Programming Languages and System Architectures, volume 782 of Lecture Notes in Computer Science, page 259-281. Springer, (1994)Safe Code - It's Not Just for Applets Anymore.. JMLC, volume 2789 of Lecture Notes in Computer Science, page 12-22. Springer, (2003)The rewards of generating true 32-bit code.. ACM SIGPLAN Notices, 26 (1): 121-123 (1991)Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities., , , , , and . CISIS, page 843-848. IEEE Computer Society, (2008)Perpetual Adaptation of Software to Hardware: An Extensible Architecture for Providing Code Optimization as a Central System Service, and . CoRR, (1999)The Oberon System Family., , , and . Softw. Pract. Exp., 25 (12): 1331-1366 (1995)Emulating an Operating System on Top of Another.. Softw. Pract. Exp., 23 (6): 677-692 (1993)Runtime Defense against Code Injection Attacks Using Replicated Execution., , , , and . IEEE Trans. Dependable Secur. Comput., 8 (4): 588-601 (2011)Containing the Ultimate Trojan Horse.. IEEE Secur. Priv., 5 (4): 52-56 (2007)Better Keep Cash in Your Boots - Hardware Wallets are the New Single Point of Failure., , , , , and . DeFi@CCS, page 1-8. ACM, (2021)