Search

Your search keyword '"Todd Austin"' showing total 38 results

Search Constraints

Start Over You searched for: Author "Todd Austin" Remove constraint Author: "Todd Austin" Topic computer Remove constraint Topic: computer
38 results on '"Todd Austin"'

Search Results

1. Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and Hardware

2. Thwarting Control Plane Attacks with Displaced and Dilated Address Spaces

3. Morpheus

4. ANVIL

5. Vulnerability-tolerant secure architectures

6. Energy efficient object detection on the mobile GP-GPU

7. SNIFFER: A high-accuracy malware detector for enterprise-based systems

8. Regaining Lost Cycles with HotCalls

9. When good protections go bad: Exploiting anti-DoS measures to accelerate rowhammer attacks

10. A2: Analog Malicious Hardware

11. A case for unlimited watchpoints

12. Demand-driven software race detection using hardware performance counters

13. A Flexible Software-Based Framework for Online Detection of Hardware Defects

14. Locking down insecure indirection with hardware-based control-data isolation

15. Keynote talk I: Ending the Tyranny of Amdahl's Law

16. On Architectural Support for Systems Security

17. SimpleScalar: an infrastructure for computer system modeling

18. Challenges in processor modeling and validation [Guest Editors' introduction]

19. The SimpleScalar tool set, version 2.0

20. Mobile supercomputers

21. Schnauzer: scalable profiling for likely security bug sites

22. Efficient detection of all pointer and array access errors

23. The potential of sampling for dynamic analysis

24. What input-language is the best choice for high level synthesis (HLS)?

25. Using introspective software-based testing for post-silicon debug and repair

27. Online design bug detection: RTL analysis, flexible mechanisms, and evaluation

28. Testudo: Heavyweight security analysis via statistical sampling

30. Low-Cost Epoch-Based Correlation Prefetching for Commercial Applications

31. Efficient checker processor design

32. CryptoManiac

33. Compiler controlled value prediction using branch predictor based confidence

34. Classifying load and store instructions for memory renaming

35. Dynamic dependency analysis of ordinary programs

36. Assessment of Low-Budget Targeted Cyberattacks Against Power Systems

37. Energy-Accuracy Scalable Deep Convolutional Neural Networks: A Pareto Analysis

38. A 65 nm CMOS Synthesizable Digital Low-Dropout Regulator Based on Voltage-to-Time Conversion with 99.6% Current Efficiency at 10-mA Load

Catalog

Books, media, physical & digital resources