Austin, Todd
700  Ergebnisse:
Personensuche X
?
1

Exploring the Efficiency of Data-Oblivious Programs:

, In: 2023 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS),
 
?
2

Security Verification of Low-Trust Architectures:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
Tan, Qinhan ; Fisseha, Yonathan ; Chen, Shibo... - p. 945-959 , 2023
 
?
3

PriMax : maximizing DSL application performance with sel..:

, In: Proceedings of the 59th ACM/IEEE Design Automation Conference,
 
?
4

These Aren't The Caches You're Looking For: Stochastic Chan..:

, In: 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED),
 
?
5

Sequestered Encryption: A Hardware Technique for Comprehens..:

, In: 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED),
 
?
6

ADA, the Center for Applications Driving Architectures: acc..:

, In: Proceedings of the 59th ACM/IEEE Design Automation Conference,
Bertacco, Valeria ; Austin, Todd ; Brooks, David... - p. 1406-1409 , 2022
 
?
7

Software-driven Security Attacks: From Vulnerability Source..:

Biernacki, Lauren ; Gallagher, Mark ; Xu, Zhixing...
ACM Journal on Emerging Technologies in Computing Systems.  17 (2021)  3 - p. 1-38 , 2021
 
?
8

Software-driven Security Attacks: From Vulnerability Source..:

Biernacki, Lauren ; Gallagher, Mark ; Xu, Zhixing...
ACM Journal on Emerging Technologies in Computing Systems (JETC).  17 (2021)  3 - p. 1-38 , 2021
 
?
9

Session details: Model-based analysis and security:

, In: Proceedings of the 23rd Conference on Design, Automation and Test in Europe,
 
?
10

Thwarting Control Plane Attacks with Displaced and Dilated ..:

, In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST),
 
?
11

Smokestack: thwarting DOP attacks with runtime stack layout..:

, In: Proceedings of the 2019 IEEE/ACM International Symposium on Code Generation and Optimization,
Aga, Misiker Tadesse ; Austin, Todd - p. 26-36 , 2019
 
?
12

Morpheus : A Vulnerability-Tolerant Secure Architecture ..:

, In: Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems,
Gallagher, Mark ; Biernacki, Lauren ; Chen, Shibo... - p. 469-484 , 2019
 
?
13

VLSI-SoC: Design and Engineering of Electronics Systems Bas.. 

IFIP Advances in Information and Communication Technology, 561
 
?
14

Cyclone : Detecting Contention-Based Cache Information L..:

, In: Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture,
Harris, Austin ; Wei, Shijia ; Sahu, Prateek... - p. 57-72 , 2019
 
?
15

Wrangling in the Power of Code Pointers with ProxyCFI:

, In: Data and Applications Security and Privacy XXXIII; Lecture Notes in Computer Science,
 
1-15
Mehr Literatur finden