Personensuche
X
?
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses ,
1
Renewable Just-In-Time Control-Flow Integrity:
, In:
?
The 21st ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems ,
2
Exploiting the Trust Between Boundaries : Discovering Me..:
, In:
?
2019 IEEE International Conference on Blockchain (Blockchain) ,
3
Smart Contract Defense through Bytecode Rewriting:
, In:
?
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security ,
4
Running Language Interpreters Inside SGX : A Lightweight..:
, In:
?
Proceedings of the 2018 International Symposium on Code Generation and Optimization ,
5
SGXElide: enabling enclave code secrecy via self-modificati..:
, In:
?
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security ,
6
SGX-Log : Securing System Logs With SGX:
, In:
?
Proceedings of the 1st Workshop on System Software for Trusted Execution ,
7