Author of the publication

Trustworthy Memory Isolation of Linux on Embedded Devices.

, , , , and . TRUST, volume 9229 of Lecture Notes in Computer Science, page 125-142. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual machine based security architecture., , , and . WorldCIS, page 210-215. IEEE, (2011)Trustworthy Memory Isolation of Linux on Embedded Devices., , , , and . TRUST, volume 9229 of Lecture Notes in Computer Science, page 125-142. Springer, (2015)Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels., , , and . POST, volume 10804 of Lecture Notes in Computer Science, page 109-133. Springer, (2018)Trustworthy Prevention of Code Injection in Linux on Embedded Devices., , , , and . ESORICS (1), volume 9326 of Lecture Notes in Computer Science, page 90-107. Springer, (2015)ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code., , , , , , , , and . EuroSys, page 4:1-4:15. ACM, (2019)Trustworthy Virtualization of the ARMv7 Memory Subsystem., , and . SOFSEM, volume 8939 of Lecture Notes in Computer Science, page 578-589. Springer, (2015)Formal verification of information flow security for a simple arm-based separation kernel., , , , and . ACM Conference on Computer and Communications Security, page 223-234. ACM, (2013)TCvisor: A hypervisor level secure storage., , , and . ICITST, page 1-9. IEEE, (2010)Provably secure memory isolation for Linux on ARM., , , and . Journal of Computer Security, 24 (6): 793-837 (2016)Machine code verification of a tiny ARM hypervisor., , and . TrustED@CCS, page 3-12. ACM, (2013)