A systematic evaluation of transient execution attacks and defenses C Canella, J Van Bulck, M Schwarz, M Lipp, B Von Berg, P Ortner, ... 28th USENIX Security Symposium (USENIX Security 19), 249-266, 2019 | 520 | 2019 |
Jump over ASLR: Attacking branch predictors to bypass ASLR D Evtyushkin, D Ponomarev, N Abu-Ghazaleh 2016 49th Annual IEEE/ACM International Symposium on Microarchitecture …, 2016 | 371 | 2016 |
Branchscope: A new side-channel attack on directional branch predictor D Evtyushkin, R Riley, N Abu-Ghazaleh, D Ponomarev ASPLOS '18: Proceedings of the Twenty-Third International Conference on …, 2018 | 356 | 2018 |
Safespec: Banishing the spectre of a meltdown with leakage-free speculation KN Khasawneh, EM Koruyeh, C Song, D Evtyushkin, D Ponomarev, ... 2019 56th ACM/IEEE Design Automation Conference (DAC), 1-6, 2019 | 164 | 2019 |
On the detection of kernel-level rootkits using hardware performance counters B Singh, D Evtyushkin, J Elwell, R Riley, I Cervesato Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 150 | 2017 |
Iso-x: A flexible architecture for hardware-managed isolated execution D Evtyushkin, J Elwell, M Ozsoy, D Ponomarev, NA Ghazaleh, R Riley 2014 47th Annual IEEE/ACM International Symposium on Microarchitecture, 190-202, 2014 | 127 | 2014 |
Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations D Evtyushkin, D Ponomarev 23rd ACM Conference on Computer and Communications Security (CCS) 40 (10), 11-57, 2016 | 97 | 2016 |
Understanding and mitigating covert channels through branch predictors D Evtyushkin, D Ponomarev, N Abu-Ghazaleh ACM Transactions on Architecture and Code Optimization (TACO) 13 (1), 1-23, 2016 | 96 | 2016 |
How the spectre and meltdown hacks really worked N Abu-Ghazaleh, D Ponomarev, D Evtyushkin IEEE Spectrum 56 (3), 42-49, 2019 | 55 | 2019 |
Covert channels through branch predictors: a feasibility study D Evtyushkin, D Ponomarev, N Abu-Ghazaleh Proceedings of the Fourth Workshop on Hardware and Architectural Support for …, 2015 | 49 | 2015 |
Exploring branch predictors for constructing transient execution trojans T Zhang, K Koltermann, D Evtyushkin Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020 | 40 | 2020 |
Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications D Evtyushkin, J Elwell, M Ozsoy, D Ponomarev, NA Ghazaleh, R Riley IEEE Transactions on Dependable and Secure Computing, 0 | 17* | |
Computing with time: Microarchitectural weird machines D Evtyushkin, T Benjamin, J Elwell, JA Eitel, A Sapello, A Ghosh Proceedings of the 26th ACM International Conference on Architectural …, 2021 | 11 | 2021 |
STBPU: A Reasonably Secure Branch Prediction Unit T Zhang, T Lesch, K Koltermann, D Evtyushkin The 52nd Annual IEEE/IFIP International Conference on Dependable Systems and …, 2022 | 8* | 2022 |
Secure Program Execution Through Hardware-Supported Isolation D Evtyushkin State University of New York at Binghamton, 2017 | 2 | 2017 |
CacheVisor: A toolset for visualizing shared caches in multicore and multithreaded processors D Evtyushkin, P Panfilov, D Ponomarev Parallel Computing Technologies: 11th International Conference, PaCT 2011 …, 2011 | 2 | 2011 |
Hardening extended memory access control schemes with self-verified address spaces J Elwell, D Evtyushkin, D Ponomarev, N Abu-Ghazaleh, R Riley 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 392-399, 2017 | 1 | 2017 |
SafeSpec KN Khasawneh, EM Koruyeh, C Song, D Evtyushkin, D Ponomarev, ... Proceedings of the 56th Annual Design Automation Conference 2019, 2019 | | 2019 |
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)| 978-1-6654-1693-1/22/$31.00© 2022 IEEE| DOI: 10.1109/DSN53405. 2022.00063 I Alam, H Alemzadeh, T Aloui, H Bagheri, B Baheri, M Bailleu, E Bertino, ... | | |
Securing Systems with Isolated Execution D Evtyushkin | | |