Cited By
View all- Adiletta ATol MDoröz YSunar BQuek TGao DZhou JCardenas A(2024)Mayhem: Targeted Corruption of Register and Stack VariablesProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637638(467-482)Online publication date: 1-Jul-2024
- Saxena AMathur SQureshi MTsafrir DMusuvathi MGupta RAbu-Ghazaleh N(2024)Rubix: Reducing the Overhead of Secure Rowhammer Mitigations via Randomized Line-to-Row MappingProceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 210.1145/3620665.3640404(1014-1028)Online publication date: 27-Apr-2024
- Jin LJiang WZhan JWen X(2024)Highly Evasive Targeted Bit-Trojan on Deep Neural NetworksIEEE Transactions on Computers10.1109/TC.2024.341670573:9(2350-2363)Online publication date: Sep-2024
- Show More Cited By