Author of the publication

Hacking in Darkness: Return-oriented Programming against Secure Enclaves.

, , , , , , , , and . USENIX Security Symposium, page 523-539. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability., , , , , and . USENIX Security Symposium, page 391-408. USENIX Association, (2023)Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing., , , , , and . USENIX Security Symposium, page 557-574. USENIX Association, (2017)Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud., , , , , and . OSDI, page 247-267. USENIX Association, (2023)deDacota: toward preventing server-side XSS via automatic code and data separation., , , , , and . ACM Conference on Computer and Communications Security, page 1205-1216. ACM, (2013)The Darknet and the Future of Content Protection., , , and . Digital Rights Management Workshop, volume 2696 of Lecture Notes in Computer Science, page 155-176. Springer, (2002)HARDLOG: Practical Tamper-Proof System Auditing Using a Novel Audit Device., , and . SP, page 1791-1807. IEEE, (2022)A highly parallel algorithm to approximate MaxCut on distributed memory architectures., and . IPPS, page 113-117. IEEE Computer Society, (1995)The Darknet and the Future of Content Distribution, , , and . Microsoft, (November 2002)Fay: Extensible Distributed Tracing from Kernels to Clusters, , , , and . ACM Trans. Comput. Syst., 30 (4): 13:1--13:35 (November 2012)Improved Lower Bounds for the Randomized Boppana-Halldórsson Algorithm for MAXCLIQUE.. COCOON, volume 959 of Lecture Notes in Computer Science, page 549-558. Springer, (1995)