From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptographically Enforced Memory Safety., , , , и . CCS, стр. 889-903. ACM, (2023)Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging., , , , , и . AsiaCCS, стр. 177-189. ACM, (2023)SCFI: State Machine Control-Flow Hardening Against Fault Attacks., , , , , и . CoRR, (2022)Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC., , , и . USENIX Security Symposium, USENIX Association, (2024)SERVAS! Secure Enclaves via RISC-V Authenticryption Shield., , , , и . ESORICS (2), том 12973 из Lecture Notes in Computer Science, стр. 370-391. Springer, (2021)Jenny: Securing Syscalls for PKU-based Memory Isolation Systems., , , и . USENIX Security Symposium, стр. 936-952. USENIX Association, (2022)SCFI: State Machine Control-Flow Hardening Against Fault Attacks., , , , , и . DATE, стр. 1-6. IEEE, (2023)TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption., , , , и . CoRR, (2024)Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs., , , , , , , и . EuroS&P, стр. 311-326. IEEE, (2024)Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations., , , и . USENIX Security Symposium, стр. 1767-1784. USENIX Association, (2020)