Author:
Dalton Michael,Kannan Hari,Kozyrakis Christos
Cited by
84 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Dynamic Possible Source Count Analysis for Data Leakage Prevention;Proceedings of the 21st ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes;2024-09-13
2. Another Break in the Wall: Harnessing Fault Injection Attacks to Penetrate Software Fortresses;Proceedings of the First International Workshop on Security and Privacy of Sensing Systems;2023-11-12
3. ProMiSE: A High-Performance Programmable Hardware Monitor for High Security Enforcement of Software Execution;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2023-11
4. SPEAR-V: Secure and Practical Enclave Architecture for RISC-V;Proceedings of the ACM Asia Conference on Computer and Communications Security;2023-07-10
5. Safety Hints for HTM Capacity Abort Mitigation;2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA);2023-02