Cited By
View all- Derakhshan FZhang ZVasudevan AJia L(2023)Towards End-to-End Verified TEEs via Verified Interface Conformance and Certified Compilers2023 IEEE 36th Computer Security Foundations Symposium (CSF)10.1109/CSF57540.2023.00021(324-339)Online publication date: Jul-2023
- Guo YWang ZZhong BZeng Q(2022)Formal Modeling and Security Analysis for Intra-level Privilege SeparationProceedings of the 38th Annual Computer Security Applications Conference10.1145/3564625.3567984(88-101)Online publication date: 5-Dec-2022
- Yang LChen YHajiesmaili MHerbster MTowsley D(2022)Hierarchical Learning Algorithms for Multi-scale Expert ProblemsProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/35309006:2(1-29)Online publication date: 6-Jun-2022
- Show More Cited By