Author of the publication

Resource-freeing attacks: improve your cloud performance (at your neighbor's expense).

, , , , and . ACM Conference on Computer and Communications Security, page 281-292. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Channel Injection and Anonymous Proofs of Account Ownership., , , and . IACR Cryptology ePrint Archive, (2016)The Tao of Inference in Privacy-Protected Databases., , , , and . IACR Cryptology ePrint Archive, (2017)Fast Message Franking: From Invisible Salamanders to Encryptment., , , and . IACR Cryptology ePrint Archive, (2019)The Pythia PRF Service., , , , and . IACR Cryptology ePrint Archive, (2015)Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG., , , , and . IEEE Symposium on Security and Privacy, page 559-574. IEEE Computer Society, (2014)A Day Late and a Dollar Short: The Case for Research on Cloud Billing Systems., , , and . HotCloud, USENIX Association, (2014)Honey Encryption: Encryption beyond the Brute-Force Barrier., and . IEEE Security & Privacy, 12 (4): 59-62 (2014)Using Program Analysis to Synthesize Sensor Spoofing Attacks., , and . AsiaCCS, page 757-770. ACM, (2017)Peeking Behind the Curtains of Serverless Platforms., , , , and . USENIX Annual Technical Conference, page 133-146. USENIX Association, (2018)Multi-Property-Preserving Hash Domain Extension and the EMD Transform., and . ASIACRYPT, volume 4284 of Lecture Notes in Computer Science, page 299-314. Springer, (2006)