[go: up one dir, main page]

Follow
Yuheng Yang
Title
Cited by
Cited by
Year
Casa: End-to-end quantitative security analysis of randomly mapped caches
T Bourgeat, J Drean, Y Yang, L Tsai, J Emer, M Yan
2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture …, 2020
692020
SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments
M Li, Y Yang, G Chen, M Yan, Y Zhang
Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024
372024
DAGguise: mitigating memory timing side channels
PW Deutsch, Y Yang, T Bourgeat, J Drean, JS Emer, M Yan
Proceedings of the 27th ACM International Conference on Architectural …, 2022
352022
Pensieve: Microarchitectural Modeling for Security Evaluation
Y Yang, T Bourgeat, S Lau, M Yan
Proceedings of the 50th Annual International Symposium on Computer …, 2023
322023
RTL verification for secure speculation using contract shadow logic
Q Tan, Y Yang, T Bourgeat, S Malik, M Yan
Proceedings of the 30th ACM International Conference on Architectural …, 2025
122025
CaSA: End-to-End Quantitative Security Analysis of Randomly Mapped Caches
T Bourgeat, J Drean, Y Yang, L Tsai, JS Emer, M Yan
IEEE Design & Test 42 (1), 5-12, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–6