Author:
Uhsadel Leif,Georges Andy,Verbauwhede Ingrid
Cited by
49 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. CuMONITOR: Continuous Monitoring of Microarchitecture for Software Task Identification and Classification;Digital Threats: Research and Practice;2024-09-14
2. Protecting Confidential Virtual Machines from Hardware Performance Counter Side Channels;2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2024-06-24
3. Serberus: Protecting Cryptographic Code from Spectres at Compile-Time;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
4. Hardware-based Detection of Malicious Firmware Modification in Microgrids;2024 37th International Conference on VLSI Design and 2024 23rd International Conference on Embedded Systems (VLSID);2024-01-06
5. Reviving Meltdown 3a;Lecture Notes in Computer Science;2024