István Haller
Orcid: 0009-0003-8259-4884
According to our database1,
István Haller
authored at least 25 papers
between 2010 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Analog Iterative Machine (AIM): using light to solve quadratic optimization problems with mixed variables.
CoRR, 2023
Proceedings of the 29th Symposium on Operating Systems Principles, 2023
2022
A Secret-Free Hypervisor: Rethinking Isolation in the Age of Speculative Vulnerabilities.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
2021
Fast and Uniform Optically-Switched Data Centre Networks Enabled by Amplitude Caching.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2021
2020
Proceedings of the SIGCOMM '20: Proceedings of the 2020 Annual conference of the ACM Special Interest Group on Data Communication on the applications, 2020
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2020
2018
Proceedings of the Optical Fiber Communications Conference and Exposition, 2018
Proceedings of the European Conference on Optical Communication, 2018
2017
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory.
Proceedings of the 26th USENIX Security Symposium, 2017
2016
Empir. Softw. Eng., 2016
METAlloc: efficient and comprehensive metadata management for software security hardening.
Proceedings of the 9th European Workshop on System Security, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! - (Or: Automated Techniques to Recover Split and Merged Variables).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
2013
login Usenix Mag., 2013
Proceedings of the 20th Working Conference on Reverse Engineering, 2013
Proceedings of the 20th Working Conference on Reverse Engineering, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
2012
IEEE Trans. Image Process., 2012
2011
Proceedings of the 10th International Symposium on Parallel and Distributed Computing, 2011
2010
Proceedings of the IEEE Intelligent Vehicles Symposium (IV), 2010
Proceedings of the 13th International IEEE Conference on Intelligent Transportation Systems, 2010
Proceedings of the Design, Automation and Test in Europe, 2010