Search for persons
X
?
Proceedings of the 6th Workshop on System Software for Trusted Execution ,
1
About Time: On the Challenges of Temporal Guarantees in Unt..:
, In:
?
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) ,
2
MicroProfiler: Principled Side-Channel Mitigation through M..:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
3
Mind the Gap: Studying the Insecurity of Provably Secure Em..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
6
Aion: Enabling Open Systems through Strong Availability Gua..:
, In:
?
2020 IEEE Symposium on Security and Privacy (SP) ,
8
Plundervolt: Software-based Fault Injection Attacks against..:
, In:
?
2020 IEEE Symposium on Security and Privacy (SP) ,
9
LVI: Hijacking Transient Execution through Microarchitectur..:
, In:
?
Annual Computer Security Applications Conference ,
10
Faulty Point Unit: ABI Poisoning Attacks on Intel SGX:
, In:
?
2020 IEEE 33rd Computer Security Foundations Symposium (CSF) ,
11
Provably Secure Isolation for Interruptible Enclaved Execut..:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
13
A Tale of Two Worlds : Assessing the Vulnerability of En..:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
14
ZombieLoad : Cross-Privilege-Boundary Data Sampling:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
15