Author:
Lie David,Thekkath Chandramohan A.,Horowitz Mark
Cited by
53 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Midsummer Night’s Tree: Efficient and High Performance Secure SCM;Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3;2024-04-27
2. Accelerating Extra Dimensional Page Walks for Confidential Computing;56th Annual IEEE/ACM International Symposium on Microarchitecture;2023-10-28
3. ERIC: An Efficient and Practical Software Obfuscation Framework;2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2022-06
4. Confidentiality and Integrity Schemes for Multicore Shared Memory Systems;Journal of Circuits, Systems and Computers;2022-01-22
5. Leveraging Hardware Isolation for Process Level Access Control & Authentication;Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies;2017-06-07