Author:
Taassori Meysam,Balasubramonian Rajeev,Chhabra Siddhartha,Alameldeen Alaa R.,Peddireddy Manjula,Agarwal Rajat,Stutsman Ryan
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Counter-light Memory Encryption;2024 ACM/IEEE 51st Annual International Symposium on Computer Architecture (ISCA);2024-06-29
2. MetaLeak: Uncovering Side Channels in Secure Processor Architectures Exploiting Metadata;2024 ACM/IEEE 51st Annual International Symposium on Computer Architecture (ISCA);2024-06-29
3. A Midsummer Night’s Tree: Efficient and High Performance Secure SCM;Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3;2024-04-27
4. sIOPMP: Scalable and Efficient I/O Protection for TEEs;Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2;2024-04-27
5. SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR Interface;2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2023-06