Search for persons
X
?
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3 ,
1
Pathfinder: High-Resolution Control-Flow Attacks Exploiting..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
3
Optical Cryptanalysis: Recovering Cryptographic Keys from P..:
, In:
?
2023 IEEE/ACM 45th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) ,
4
CryptOpt: Automatic Optimization of Straightline Code:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
5
iLeakage: Browser-based Timerless Speculative Execution Att..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
6
Spectre Declassified: Reading from the Right Place at the W..:
, In:
?
2023 IEEE/ACM 31st International Conference on Program Comprehension (ICPC) ,
9
Revisiting Lightweight Compiler Provenance Recovery on ARM ..:
, In:
?
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security ,
11
CacheFX: A Framework for Evaluating Cache Security:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
12
HammerScope : Observing DRAM Power Consumption Using Row..:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
13
SpecHammer: Combining Spectre and Rowhammer for New Specula..:
, In:
?
Advances in Cryptology – CRYPTO 2022; Lecture Notes in Computer Science ,
14
Snapshot-Oblivious RAMs: Sub-logarithmic Efficiency for Sho..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
15