Author:
Chen Xiaoxin,Garfinkel Tal,Lewis E. Christopher,Subrahmanyam Pratap,Waldspurger Carl A.,Boneh Dan,Dwoskin Jeffrey,Ports Dan R.K.
Cited by
127 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Efficient Auditing of Event-driven Web Applications;Proceedings of the Nineteenth European Conference on Computer Systems;2024-04-22
2. Profiling with trust: system monitoring from trusted execution environments;Design Automation for Embedded Systems;2024-02-16
3. DScope: To Reliably and Securely Acquire Live Data from Kernel-Compromised ARM Devices;Lecture Notes in Computer Science;2024
4. Coherence Attacks and Countermeasures in Interposer-Based Chiplet Systems;ACM Transactions on Architecture and Code Optimization;2023-11-20
5. Creating Trust by Abolishing Hierarchies;Proceedings of the 19th Workshop on Hot Topics in Operating Systems;2023-06-22