ORCID as entered in ROS

Select Publications
2025, Verifying Device Drivers with Pancake, http://arxiv.org/abs/2501.08249v2
,2025, Fast, Secure, Adaptable: LionsOS Design, Implementation and Performance, http://arxiv.org/abs/2501.06234v2
,2024, fence.t.s: Closing Timing Channels in High-Performance Out-of-Order Cores through ISA-Supported Temporal Partitioning, http://dx.doi.org/10.48550/arxiv.2409.07576
,2023, Proving the Absence of Microarchitectural Timing Channels, http://arxiv.org/abs/2310.17046v1
,2022, Systematic Prevention of On-Core Timing Channels by Full Temporal Partitioning, http://dx.doi.org/10.48550/arxiv.2202.12029
,2020, Prevention of Microarchitectural Covert Channels on an Open-Source 64-bit RISC-V Core, http://dx.doi.org/10.48550/arxiv.2005.02193
,2019, Can We Prove Time Protection?, http://arxiv.org/abs/1901.08338v1
,2018, Time Protection: the Missing OS Abstraction, http://arxiv.org/abs/1810.05345v2
,2018, Benchmarking Crimes: An Emerging Threat in Systems Security, http://dx.doi.org/10.48550/arxiv.1801.02381
,2016, Your Processor Leaks Information - and There's Nothing You Can Do About It, http://arxiv.org/abs/1612.04474v6
,2016, An Evaluation of Coarse-Grained Locking for Multicore Microkernels, https://pdfs.semanticscholar.org/762a/284bd8b6ace609285f72f22dc1e03b004f33.pdf
,2016, It's Time: OS Mechanisms for Enforcing Asymmetric Temporal Integrity, http://arxiv.org/abs/1606.00111v2
,