research
∙
05/19/2019
Safe and Chaotic Compilation for Hidden Deterministic Hardware Aliasing
Hardware aliasing occurs when the same logical address can access differ...
research
∙
04/20/2019
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name
An `obfuscation' for encrypted computing is quantified exactly here, lea...
research
∙
04/20/2019
Compiling for Encrypted Computing: Obfuscation but Not in Name
Encrypted computing is the emerging science and technology of processors...
research
∙
02/16/2019
Compiled Obfuscation for Data Structures in Encrypted Computing
Encrypted computing is an emerging technology based on a processor that ...
research
∙
01/30/2019
Safe Compilation for Hidden Deterministic Hardware Aliasing and Encrypted Computing
Hardware aliasing occurs when the same logical address sporadically acce...
research
∙
11/29/2018