Author of the publication

Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.

, , , , , , , , , and . USENIX Security Symposium, page 991-1008. USENIX Association, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Implementation of a High Assurance Smart Meter Using Protected Module Architectures., , , , , and . WISTP, volume 9895 of Lecture Notes in Computer Science, page 53-69. Springer, (2016)Secure Resource Sharing for Embedded Protected Module Architectures., , , and . WISTP, volume 9311 of Lecture Notes in Computer Science, page 71-87. Springer, (2015)A Systematic Evaluation of Transient Execution Attacks and Defenses., , , , , , , , and . CoRR, (2018)Towards availability and real-time guarantees for protected module architectures., , , and . MODULARITY (Companion), page 146-151. ACM, (2016)ZombieLoad: Cross-Privilege-Boundary Data Sampling., , , , , , and . CCS, page 753-768. ACM, (2019)A Systematic Evaluation of Transient Execution Attacks and Defenses., , , , , , , , and . USENIX Security Symposium, page 249-266. USENIX Association, (2019)Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution., , , , , , , , , and . USENIX Security Symposium, page 991-1008. USENIX Association, (2018)A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes., , , , , and . CCS, page 1741-1758. ACM, (2019)Off-Limits: Abusing Legacy x86 Memory Segmentation to Spy on Enclaved Execution., , , and . ESSoS, volume 10953 of Lecture Notes in Computer Science, page 44-60. Springer, (2018)Reflections on Post-Meltdown Trusted Computing: A Case for Open Security Processors., and . ;login:, (2018)