A Comparison of Immunohistochemical Expression of Epidermal Growth Factor Receptor and Human Epidermal Growth Factor Receptor 2 in Dental Follicles with Different Radiographic Sizes
Saravani, Shirin, Nemati Rezvani, Hamed, Shahraki, Mehrdad, Kadeh, Hamideh
Published in Iranian journal of medical sciences (01.08.2024)
Published in Iranian journal of medical sciences (01.08.2024)
Get full text
Journal Article
Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures
Guanciale, Roberto, Nemati, Hamed, Baumann, Christoph, Dam, Mads
Published in 2016 IEEE Symposium on Security and Privacy (SP) (01.05.2016)
Published in 2016 IEEE Symposium on Security and Privacy (SP) (01.05.2016)
Get full text
Conference Proceeding
Journal Article
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time
Mosier, Nicholas, Nemati, Hamed, Mitchell, John C., Trippel, Caroline
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19.05.2024)
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19.05.2024)
Get full text
Conference Proceeding
Input Algebras
Gopinath, Rahul, Nemati, Hamed, Zeller, Andreas
Published in 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE) (01.05.2021)
Published in 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE) (01.05.2021)
Get full text
Conference Proceeding
Replication Package for Input Algebras
Gopinath, Rahul, Nemati, Hamed, Zeller, Andreas
Published in 2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) (01.05.2021)
Published in 2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) (01.05.2021)
Get full text
Conference Proceeding
Provably secure memory isolation for Linux on ARM
Guanciale, Roberto, Nemati, Hamed, Dam, Mads, Baumann, Christoph
Published in Journal of computer security (2016)
Published in Journal of computer security (2016)
Get full text
Journal Article
On Compositional Information Flow Aware Refinement
Baumann, Christoph, Dam, Mads, Guanciale, Roberto, Nemati, Hamed
Published in 2021 IEEE 34th Computer Security Foundations Symposium (CSF) (01.06.2021)
Published in 2021 IEEE 34th Computer Security Foundations Symposium (CSF) (01.06.2021)
Get full text
Conference Proceeding
Trustworthy Virtualization of the ARMv7 Memory Subsystem
Nemati, Hamed, Guanciale, Roberto, Dam, Mads
Published in 41st International Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2015 (2015)
Published in 41st International Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2015 (2015)
Get full text
Book Chapter
Conference Proceeding
Trustworthy Memory Isolation of Linux on Embedded Devices
Get full text
Book Chapter
Conference Proceeding
Trustworthy Prevention of Code Injection in Linux on Embedded Devices
Chfouka, Hind, Nemati, Hamed, Guanciale, Roberto, Dam, Mads, Ekdahl, Patrik
Published in 20th European Symposium on Research in Computer Security, ESORICS 2015 (2015)
Published in 20th European Symposium on Research in Computer Security, ESORICS 2015 (2015)
Get full text
Book Chapter
Conference Proceeding
Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance Optimization
Marinaro, Tiziano, Buiras, Pablo, Lindner, Andreas, Guanciale, Roberto, Nemati, Hamed
Year of Publication 15.12.2023
Year of Publication 15.12.2023
Get full text
Journal Article