Search for persons
X
?
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3 ,
1
Energy-Adaptive Buffering for Efficient, Responsive, and Pe..:
, In:
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
2
SRAM Imprinting for System Protection and Differentiation:
, In:
?
Proceedings of the 11th International Workshop on Energy Harvesting & Energy-Neutral Sensing Systems ,
3
Hitchhiker's Guide to Secure Checkpointing on Energy-Harves..:
, In:
?
2023 IEEE International Symposium on Circuits and Systems (ISCAS) ,
4
RF Energy Harvesting in Minimization of Age of Information ..:
, In:
?
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security ,
5
T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Ro..:
, In:
?
2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO) ,
6
Self-Reinforcing Memoization for Cryptography Calculations ..:
, In:
?
Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems ,
7
SRAM has no chill: exploiting power domain separation to st..:
, In:
?
Proceedings of the 38th Annual Computer Security Applications Conference ,
8
One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via T..:
, In:
?
Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems ,
9
Invisible bits: hiding secret messages in SRAM's analog dom..:
, In:
?
Proceedings of the 48th Annual International Symposium on Computer Architecture ,
10
Failure sentinels : ubiquitous just-in-time intermittent..:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
11
Bomberman: Defining and Defeating Hardware Ticking Timebomb..:
, In:
?
Annual Computer Security Applications Conference ,
12
RingRAM: A Unified Hardware SecurityPrimitive for IoT Devic..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
13
Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing..:
, In:
?
2020 IEEE Symposium on Security and Privacy (SP) ,
14
ICAS: an Extensible Framework for Estimating the Susceptibi..:
, In:
?
Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems ,
15