Publication Building Trust in the User I/O in Computer Systems Publication Hacking in Darkness: Return-oriented Programming against Secure Enclaves Publication Breaking Kernel Address Space Layout Randomization with Intel TSX «« « 1 2 3 4 … 8 » »»