Follow
Dmitry Evtyushkin
Title
Cited by
Cited by
Year
A systematic evaluation of transient execution attacks and defenses
C Canella, J Van Bulck, M Schwarz, M Lipp, B Von Berg, P Ortner, ...
28th USENIX Security Symposium (USENIX Security 19), 249-266, 2019
5202019
Jump over ASLR: Attacking branch predictors to bypass ASLR
D Evtyushkin, D Ponomarev, N Abu-Ghazaleh
2016 49th Annual IEEE/ACM International Symposium on Microarchitecture …, 2016
3712016
Branchscope: A new side-channel attack on directional branch predictor
D Evtyushkin, R Riley, N Abu-Ghazaleh, D Ponomarev
ASPLOS '18: Proceedings of the Twenty-Third International Conference on …, 2018
3562018
Safespec: Banishing the spectre of a meltdown with leakage-free speculation
KN Khasawneh, EM Koruyeh, C Song, D Evtyushkin, D Ponomarev, ...
2019 56th ACM/IEEE Design Automation Conference (DAC), 1-6, 2019
1642019
On the detection of kernel-level rootkits using hardware performance counters
B Singh, D Evtyushkin, J Elwell, R Riley, I Cervesato
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
1502017
Iso-x: A flexible architecture for hardware-managed isolated execution
D Evtyushkin, J Elwell, M Ozsoy, D Ponomarev, NA Ghazaleh, R Riley
2014 47th Annual IEEE/ACM International Symposium on Microarchitecture, 190-202, 2014
1272014
Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations
D Evtyushkin, D Ponomarev
23rd ACM Conference on Computer and Communications Security (CCS) 40 (10), 11-57, 2016
972016
Understanding and mitigating covert channels through branch predictors
D Evtyushkin, D Ponomarev, N Abu-Ghazaleh
ACM Transactions on Architecture and Code Optimization (TACO) 13 (1), 1-23, 2016
962016
How the spectre and meltdown hacks really worked
N Abu-Ghazaleh, D Ponomarev, D Evtyushkin
IEEE Spectrum 56 (3), 42-49, 2019
552019
Covert channels through branch predictors: a feasibility study
D Evtyushkin, D Ponomarev, N Abu-Ghazaleh
Proceedings of the Fourth Workshop on Hardware and Architectural Support for …, 2015
492015
Exploring branch predictors for constructing transient execution trojans
T Zhang, K Koltermann, D Evtyushkin
Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020
402020
Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications
D Evtyushkin, J Elwell, M Ozsoy, D Ponomarev, NA Ghazaleh, R Riley
IEEE Transactions on Dependable and Secure Computing, 0
17*
Computing with time: Microarchitectural weird machines
D Evtyushkin, T Benjamin, J Elwell, JA Eitel, A Sapello, A Ghosh
Proceedings of the 26th ACM International Conference on Architectural …, 2021
112021
STBPU: A Reasonably Secure Branch Prediction Unit
T Zhang, T Lesch, K Koltermann, D Evtyushkin
The 52nd Annual IEEE/IFIP International Conference on Dependable Systems and …, 2022
8*2022
Secure Program Execution Through Hardware-Supported Isolation
D Evtyushkin
State University of New York at Binghamton, 2017
22017
CacheVisor: A toolset for visualizing shared caches in multicore and multithreaded processors
D Evtyushkin, P Panfilov, D Ponomarev
Parallel Computing Technologies: 11th International Conference, PaCT 2011 …, 2011
22011
Hardening extended memory access control schemes with self-verified address spaces
J Elwell, D Evtyushkin, D Ponomarev, N Abu-Ghazaleh, R Riley
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 392-399, 2017
12017
SafeSpec
KN Khasawneh, EM Koruyeh, C Song, D Evtyushkin, D Ponomarev, ...
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
2019
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)| 978-1-6654-1693-1/22/$31.00© 2022 IEEE| DOI: 10.1109/DSN53405. 2022.00063
I Alam, H Alemzadeh, T Aloui, H Bagheri, B Baheri, M Bailleu, E Bertino, ...
Securing Systems with Isolated Execution
D Evtyushkin
The system can't perform the operation now. Try again later.
Articles 1–20