Personensuche
X
?
2023 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS) ,
1
Exploring the Efficiency of Data-Oblivious Programs:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
2
Security Verification of Low-Trust Architectures:
, In:
?
Proceedings of the 59th ACM/IEEE Design Automation Conference ,
3
PriMax : maximizing DSL application performance with sel..:
, In:
?
2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED) ,
4
These Aren't The Caches You're Looking For: Stochastic Chan..:
, In:
?
2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED) ,
5
Sequestered Encryption: A Hardware Technique for Comprehens..:
, In:
?
Proceedings of the 59th ACM/IEEE Design Automation Conference ,
6
ADA, the Center for Applications Driving Architectures: acc..:
, In:
?
Proceedings of the 23rd Conference on Design, Automation and Test in Europe ,
9
Session details: Model-based analysis and security:
, In:
?
2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) ,
10
Thwarting Control Plane Attacks with Displaced and Dilated ..:
, In:
?
Proceedings of the 2019 IEEE/ACM International Symposium on Code Generation and Optimization ,
11
Smokestack: thwarting DOP attacks with runtime stack layout..:
, In:
?
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems ,
12
Morpheus : A Vulnerability-Tolerant Secure Architecture ..:
, In:
?
13
VLSI-SoC: Design and Engineering of Electronics Systems Bas..
IFIP Advances in Information and Communication Technology, 561
?
Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture ,
14
Cyclone : Detecting Contention-Based Cache Information L..:
, In:
?
Data and Applications Security and Privacy XXXIII; Lecture Notes in Computer Science ,
15