Author:
Suh G.E.,Clarke D.,Gasend B.,van Dijk M.,Devadas S.
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Counter-light Memory Encryption;2024 ACM/IEEE 51st Annual International Symposium on Computer Architecture (ISCA);2024-06-29
2. MetaLeak: Uncovering Side Channels in Secure Processor Architectures Exploiting Metadata;2024 ACM/IEEE 51st Annual International Symposium on Computer Architecture (ISCA);2024-06-29
3. A Midsummer Night’s Tree: Efficient and High Performance Secure SCM;Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3;2024-04-27
4. Data Enclave: A Data-Centric Trusted Execution Environment;2024 IEEE International Symposium on High-Performance Computer Architecture (HPCA);2024-03-02
5. Hitchhiker: Accelerating ORAM With Dynamic Scheduling;IEEE Transactions on Computers;2023-08-01