Cited By
View all- Pal ADesai KChatterjee RSan Miguel J(2024)Camouflage: Utility-Aware Obfuscation for Accurate Simulation of Sensitive Program TracesACM Transactions on Architecture and Code Optimization10.1145/365011021:2(1-23)Online publication date: 21-May-2024
- Wei SHarris AZhu YRamrakhyani PLin CTiwari M(2024)Tail Victims in Termination Timing Channel Defenses Beyond Cryptographic Kernels2024 International Symposium on Secure and Private Execution Environment Design (SEED)10.1109/SEED61283.2024.00012(11-22)Online publication date: 16-May-2024
- Miteloudi KAdhikary Avan Drueten NBatina LBuhan I(2024)Plan Your Defense: A Comparative Analysis of Leakage Detection Methods on RISC-V CoresEmbedded Computer Systems: Architectures, Modeling, and Simulation10.1007/978-3-031-78380-7_12(139-151)Online publication date: 30-Jun-2024
- Show More Cited By