Search for persons
X
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
1
Mayhem: Targeted Corruption of Register and Stack Variables:
, In:
?
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) ,
3
Don't Knock! Rowhammer at the Backdoor of DNN Models:
, In:
?
Security of FPGA-Accelerated Cloud Computing Environments ,
4
Microarchitectural Vulnerabilities Introduced, Exploited, a..:
, In:
?
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security ,
5
IOTLB-SC: An Accelerator-Independent Leakage Source in Mode..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
6
Jolt: Recovering TLS Signing Keys via Rowhammer Faults:
, In:
?
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P) ,
7
Signature Correction Attack on Dilithium Signature Scheme:
, In:
?
2021 IEEE European Symposium on Security and Privacy (EuroS&P) ,
8
FastSpec: Scalable Generation and Detection of Spectre Gadg..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
11
QuantumHammer : A Practical Hybrid Attack on the LUOV Si..:
, In:
?
2020 IEEE Symposium on Security and Privacy (SP) ,
13
LVI: Hijacking Transient Execution through Microarchitectur..:
, In:
?
2019 Workshop on DYnamic and Novel Advances in Machine learning and Intelligent Cyber Security ,
14
DeepCloak: Adversarial Crafting As a Defensive Measure to C..:
, In:
?
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security ,
15