Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Compilation to Modern Processors., , , and . CSF, page 171-185. IEEE Computer Society, (2012)Fides: selectively hardening software application components against kernel-level or process-level malware., and . ACM Conference on Computer and Communications Security, page 2-13. ACM, (2012)Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow., , , , , , , , , and . IEEE Micro, 39 (3): 66-74 (2019)Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic., , and . ACM Conference on Computer and Communications Security, page 178-195. ACM, (2018)ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel., , , and . ICISS, volume 7671 of Lecture Notes in Computer Science, page 119-133. Springer, (2012)Recent Developments in Low-Level Software Security., , , , and . WISTP, volume 7322 of Lecture Notes in Computer Science, page 1-16. Springer, (2012)Efficient Isolation of Trusted Subsystems in Embedded Systems., , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 344-361. Springer, (2010)On the effectiveness of virtualization-based security., , , , and . CoRR, (2014)Secure Compilation to Protected Module Architectures., , , , , and . ACM Trans. Program. Lang. Syst., 37 (2): 6:1-6:50 (2015)Hardening Intel SGX Applications: Balancing Concerns., , and . SysTEX@SOSP, page 2:1-2:2. ACM, (2017)