Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Specfuscator: Evaluating Branch Removal as a Spectre Mitigation., , , and . Financial Cryptography (1), volume 12674 of Lecture Notes in Computer Science, page 293-310. Springer, (2021)Speculative Dereferencing: Reviving Foreshadow., , , and . Financial Cryptography (1), volume 12674 of Lecture Notes in Computer Science, page 311-330. Springer, (2021)Signalling Preferences in Interviewing Markets., and . Computational Social Systems and the Internet, volume 07271 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)Neue Techniken - neue Arbeitspolitik?, and . Untersuchungen des Instituts zur Erforschung sozialer Chancen (ISO), Köln Campus-Verl., Frankfurt/Main u.a., (1989)Umweltschutz im Betriebsalltag, and . Studien zur Sozialwissenschaft Westdt. Verl., Opladen, (1994)An Approach to Improve Physical Activity by Generating Individual Implementation Intentions., , , and . UMAP (Adjunct Publication), page 370-375. ACM, (2017)Correctness Witness Validation by Abstract Interpretation., , , , , and . CoRR, (2023)Clustered Relational Thread-Modular Abstract Interpretation with Local Traces., , , , and . ESOP, volume 13990 of Lecture Notes in Computer Science, page 28-58. Springer, (2023)(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels., , , and . USENIX Security Symposium, page 7267-7284. USENIX Association, (2023)Meltdown: Reading Kernel Memory from User Space., , , , , , , , , and 2 other author(s). USENIX Security Symposium, page 973-990. USENIX Association, (2018)