Personensuche
X
?
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop ,
2
An REE-independent Approach to Identify Callers of TEEs in ..:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
3
AppBastion: Protection from Untrusted Apps and OSes on ARM:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
8
CCSW'20: 2020 Cloud Computing Security Workshop:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop ,
11
Speculative Execution Attacks and Cloud Security:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
12
CCSW'19 Workshop Summary : 2019 Cloud Computing Security..:
, In:
?
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ,
13