Search

Your search keyword '"Todd Austin"' showing total 139 results

Search Constraints

Start Over You searched for: Author "Todd Austin" Remove constraint Author: "Todd Austin" Database OpenAIRE Remove constraint Database: OpenAIRE
139 results on '"Todd Austin"'

Search Results

3. Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses

9. VIP-Bench: A Benchmark Suite for Evaluating Privacy-Enhanced Computation Frameworks

10. Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and Hardware

11. ChipAdvisor: A Machine Learning Approach for Mapping Applications to Heterogeneous Systems

12. A Defense-Inspired Benchmark Suite

13. Thwarting Control Plane Attacks with Displaced and Dilated Address Spaces

14. Slide-free MUSE Microscopy to H&E Histology Modality Conversion via Unpaired Image-to-Image Translation GAN Models

15. Exploiting the analog properties of digital circuits for malicious hardware

16. Slide-free MUSE Microscopy to H&E Histology Modality Conversion via Unpaired Image-to-Image Translation GAN Models

17. Cyclone

19. Morpheus

20. SiPterposer: A Fault-Tolerant Substrate for Flexible System-in-Package Design

21. ANVIL

23. Wrangling in the Power of Code Pointers with ProxyCFI

25. Vulnerability-tolerant secure architectures

26. SWAN

27. Reducing the overhead of authenticated memory encryption using delta encoding and ECC memory

28. uSFI: Ultra-lightweight software fault isolation for IoT-class devices

29. Energy efficient object detection on the mobile GP-GPU

30. SNIFFER: A high-accuracy malware detector for enterprise-based systems

31. Keynote: Peering into the post Moore's Law world

32. Regaining Lost Cycles with HotCalls

33. When good protections go bad: Exploiting anti-DoS measures to accelerate rowhammer attacks

34. Cold Boot Attacks are Still Hot: Security Analysis of Memory Scramblers in Modern Processors

35. Ozone: Efficient Execution with Zero Timing Leakage for Modern Microarchitectures

36. A2: Analog Malicious Hardware

37. A case for unlimited watchpoints

38. Demand-driven software race detection using hardware performance counters

39. Energy-Efficient Subthreshold Processor Design

40. A Flexible Software-Based Framework for Online Detection of Hardware Defects

41. Reliable Systems on Unreliable Fabrics

42. Exploring Variability and Performance in a Sub-200-mV Processor

43. Using Field-Repairable Control Logic to Correct Design Errors in Microprocessors

44. Exploring Specialized Near-Memory Processing for Data Intensive Operations

45. Architectural implications of brick and mortar silicon manufacturing

46. Microprocessor Verification via Feedback-Adjusted Markov Models

47. Locking down insecure indirection with hardware-based control-data isolation

48. Keynote talk I: Ending the Tyranny of Amdahl's Law

49. Ultra low-cost defect protection for microprocessor pipelines

50. Razor: circuit-level correction of timing errors for low-power operation

Catalog

Books, media, physical & digital resources