Search for persons
X
?
Proceedings of the Fifteenth European Conference on Computer Systems ,
3
Autarky : closing controlled channels with self-paging e..:
, In:
?
Proceedings of the 27th ACM Symposium on Operating Systems Principles ,
6
Scaling symbolic evaluation for automated verification of s..:
, In:
?
Proceedings of the 26th Symposium on Operating Systems Principles ,
7
Komodo : Using verification to disentangle secure-enclav..:
, In:
?
Proceedings of the 16th Workshop on Hot Topics in Operating Systems ,
8
Hardware is the new Software:
, In:
?
Proceedings of the 25th Symposium on Operating Systems Principles ,
9
Session details: Storage systems:
, In:
?
Proceedings of the 11th USENIX conference on Operating Systems Design and Implementation ,
12
Shielding applications from an untrusted cloud with Haven:
, In:
?
Proceedings of the 8th ACM European Conference on Computer Systems ,
13