登录
×
邮箱/用户名
密码
验证码:
换一张
登录
×
统一认证登录
测试库
学校
|
图书馆
统一认证登录
|
登录
|
English
|
RSS Feeds
|
Atom Feeds
首页
学术成果
院系机构
南科学者
SUSTech-KC
数据分析
学位论文
南科刊物
帮助
中文版
|
English
登录
注册
首页
学术成果
院系机构
南科学者
数据分析
学位论文
南科刊物
帮助
ALL
ORCID
题名
作者
发表年份
关键词
成果类型
DOI
期刊来源
收录类别
出版者
ESI学科分类
其他关键词
国内统一刊号
图片搜索
粘贴图片网址
搜索
个人简历
个人简介
荣誉奖励
荣誉头衔
工作经历
教育背景
指导学生
科研成果
代表作
成果类型
收录类别
发表年份
学校署名
作者类别
第一作者(22)
通讯作者(24)
其他作者(64)
重要成果
ESI学科分类
期刊来源
全文
语种
合作者
统计分析
成果趋势
成果类型
成果收录
期刊分布
关键词云图
合作作者
合作国家/地区
访问统计
访问统计
月访问量
0
内部: 0
外部: 0
国内: 0
国外: 0
年访问量
0
内部: 0
外部: 0
国内: 0
国外: 0
总访问量
7
内部: 0
外部: 7
国内: 6
国外: 1
访问量
访问量
1.
TLB Poisoning Attacks on AMD Secure Encrypted Virtualization
[22]
2.
Cape: Compiler-Aided Program Transformation forHTM-Based Cache Sid..
[17]
3.
Narrator: Secure and Practical State Continuity for Trusted Execut..
[15]
4.
Multi-Certificate Attacks against Proof-of-Elapsed-Time And Their ..
[15]
5.
SPECBOX: A Label-Based Transparent Speculation Scheme Against Tran..
[12]
6.
Dancing with Wolves: An Intra-process Isolation Technique with Pri..
[11]
7.
A Survey of Microarchitectural Side-channel Vulnerabilities, Attac..
[9]
8.
CIPHERLEAKS: Breaking constant-time cryptography on AMD SEV via th..
[9]
9.
Specularizer : Detecting Speculative Execution Attacks via Perform..
[5]
10.
CrossLine: Breaking "security-by-Crash" based Memory Isolation in ..
[5]
11.
Panda: Security Analysis of Algorand Smart Contracts
[5]
12.
Towards formal verification of state continuity for enclave progra..
[4]
13.
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP
[4]
14.
INTROSPECTRE: A pre-silicon framework for discovery and analysis o..
[3]
15.
Defeating traffic analysis via differential privacy: a case study ..
[3]
16.
SoK: Understanding Designs Choices and Pitfalls of Trusted Executi..
[3]
17.
Securing TEEs With Verifiable Execution Contracts
[2]
18.
vSGX: Virtualizing SGX Enclaves on AMD SEV
[2]
19.
ENCLYZER: Automated Analysis of Transient Data Leaks on Intel SGX
[2]
20.
SvTPM: SGX-based Virtual Trusted Platform Modules for Cloud Comput..
[2]
21.
一种检测侧信道漏洞的方法和装置
[2]
22.
VeriTrain: Validating MLaaS Training Efforts via Anomaly Detection
[2]
23.
SpecWands: An Efficient Priority-based Scheduler Against Speculati..
[2]
24.
TEESec: Pre-Silicon Vulnerability Discovery for Trusted Execution ..
[2]
25.
PANIC: PAN-assisted Intra-process Memory Isolation on ARM
[2]
26.
Ensuring State Continuity for Confidential Computing: A Blockchain..
[2]
27.
SAEG: Stateful Automatic Exploit Generation
[2]
28.
ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes
[1]
29.
PwrLeak: Exploiting Power Reporting Interface for Side-Channel At..
[1]
30.
Controlled Data Races in Enclaves: Attacks and Detection
[1]
31.
CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabil..
[1]
32.
Uncovering and Exploiting AMD Speculative Memory Access Predictors..
[1]
33.
ReminISCence: Trusted Monitoring Against Privileged Preemption Sid..
[1]
下载量