Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control., , , , , and . SysTEX@Middleware, page 6:1-6:6. ACM, (2016)Taming subsystems: capabilities as universal resource access control in L4., and . IIES@EuroSys, page 25-30. ACM, (2009)Decoupled: Low-Effort Noise-Free Execution on Commodity Systems., , and . ROSS@HPDC, page 2:1-2:8. ACM, (2016)Less is More - A Secure Microkernel-Based Operating System., and . SysSec@DIMVA, page 103-106. IEEE, (2011)Secure Virtualization of Latency-Constrained Systems.. Dresden University of Technology, (2015)Poster: evaluation of the industrial suitability of a software platform for future smartphones., , , and . MobiSys, page 407-408. ACM, (2011)Flattening hierarchical scheduling., , , and . EMSOFT, page 93-102. ACM, (2012)ICT-Emuco. An innovative solution for future smart phones., , , , , and . ICME, page 1821-1824. IEEE, (2009)The Nizza secure-system architecture., , , , , , and . CollaborateCom, IEEE Computer Society / ICST, (2005)Demo Abstract: Timing Aware Hardware Virtualization on the L4Re Microkernel Systems., and . RTAS, page 68. IEEE Computer Society, (2016)