Personensuche
X
?
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses ,
1
Quarantine: Mitigating Transient Execution Attacks with Phy..:
, In:
?
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2 ,
2
Copy-on-Pin: The Missing Piece for Correct Copy-on-Write:
, In:
?
Proceedings of the 14th ACM International Conference on Systems and Storage ,
4
Dealing with (some of) the fallout from meltdown:
, In:
?
Proceedings of the Sixteenth European Conference on Computer Systems ,
5
Characterizing, exploiting, and detecting DMA code injectio..:
, In:
?
Proceedings of the Fifteenth European Conference on Computer Systems ,
6
Don't shoot down TLB shootdowns!:
, In:
?
Proceedings of the Fifteenth European Conference on Computer Systems ,
7
RAIDP : replication with intra-disk parity:
, In:
?
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation ,
8
Simple and precise static analysis of untrusted Linux kerne..:
, In:
?
Proceedings of the 46th International Symposium on Computer Architecture ,
9
Using SMT to accelerate nested virtualization:
, In:
?
Proceedings of the 2017 Symposium on Cloud Computing ,
10
Remote memory in the age of fast networks:
, In:
?
Proceedings of the 16th Workshop on Hot Topics in Operating Systems ,
12