From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Meltdown., , , , , , , , , и . CoRR, (2018)PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses., , , , , и . MICRO, стр. 28-41. IEEE, (2020)"Make Sure DSA Signing Exponentiations Really are Constant-Time"., , и . ACM Conference on Computer and Communications Security, стр. 1639-1650. ACM, (2016)Whack-a-Meltdown: Microarchitectural Security Games Systems Attacks and Defenses., и . IEEE Secur. Priv., 19 (1): 95-98 (2021)iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices., , , и . CCS, стр. 2038-2052. ACM, (2023)Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers., , , , , и . NDSS, The Internet Society, (2021)Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses., , , , , и . USENIX Security Symposium, стр. 2863-2880. USENIX Association, (2021)Robust Website Fingerprinting Through the Cache Occupancy Channel., , , , , , и . USENIX Security Symposium, стр. 639-656. USENIX Association, (2019)Ultimate SLH: Taking Speculative Load Hardening to the Next Level., , , , и . USENIX Security Symposium, стр. 7125-7142. USENIX Association, (2023)Drive-By Key-Extraction Cache Attacks from Portable Code., , , и . ACNS, том 10892 из Lecture Notes in Computer Science, стр. 83-102. Springer, (2018)