Truspy: Cache side-channel information leakage from the secure world on arm devices N Zhang, K Sun, D Shands, W Lou, YT Hou Cryptology ePrint Archive, 2016 | 163 | 2016 |
Models for coalition-based access control (CBAC) E Cohen, RK Thomas, W Winsborough, D Shands Proceedings of the seventh ACM symposium on Access control models and …, 2002 | 146 | 2002 |
Obfusmem: A low-overhead access obfuscation for trusted memories A Awad, Y Wang, D Shands, Y Solihin Proceedings of the 44th Annual International Symposium on Computer …, 2017 | 108 | 2017 |
Secure virtual enclaves: Supporting coalition use of distributed application technologies D Shands, J Jacobs, R Yee, EJ Sebes ACM Transactions on Information and System Security (TISSEC) 4 (2), 103-133, 2001 | 92 | 2001 |
Trusense: Information leakage from trustzone N Zhang, K Sun, D Shands, W Lou, YT Hou IEEE INFOCOM 2018-IEEE conference on computer communications, 1097-1105, 2018 | 54 | 2018 |
Timestamping events for inferring'affects' relation and potential causality. M Ahuja, T Carlson, A Gahlot, D Shands COMPSAC, 606-611, 1991 | 17 | 1991 |
Sigma: Security and interoperability for heterogeneous distributed systems T Benzel, D Sterne, P Pasturel, G Tally, D Shands, E Sebes Proceedings DARPA Information Survivability Conference and Exposition …, 2000 | 5 | 2000 |
ObfusMem A Awad, Y Wang, D Shands, Y Solihin Proceedings of the 44th Annual International Symposium on Computer Architecture, 2017 | | 2017 |
SPiCE: Configuration Synthesis for Policy Enforcement D Shands, E Wu, J Jacobs, J Horning, S Weeks | | 2004 |
A formal method for classifying distributed systems DA Shands The Ohio State University, 1994 | | 1994 |
Characterizing distributed systems using knowledge-based models: preliminary version D Shands, CK Chang Proceedings of the 4th conference on Theoretical aspects of reasoning about …, 1992 | | 1992 |
S&P 2007 D Shands, Y Guan, T Benzel, B Pfitzmann, P McDaniel | | |
Message from the General Co-Chairs DDS Prvulovic, Y Solihin, G Venkataramani | | |