2024 article
Salus: Efficient Security Support for CXL-Expanded GPU Memory
2024 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA 2024, pp. 233–248.
2023 journal article
A Secure Computing System With Hardware-Efficient Lazy Bonsai Merkle Tree for FPGA-Attached Embedded Memory
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 21(4), 3262–3279.
2023 article
CryptoMMU: Enabling Scalable and Secure Access Control of Third-Party Accelerators
56TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, MICRO 2023, pp. 32–48.
2023 article
D-Shield: Enabling Processor-side Encryption and Integrity Verification for Secure NVMe Drives
2023 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA, pp. 908–921.
2023 article
ERAS: A Flexible and Scalable Framework for Seamless Integration of RTL Models with Structural Simulation Toolkit
2023 IEEE INTERNATIONAL SYMPOSIUM ON WORKLOAD CHARACTERIZATION, IISWC, pp. 196–200.
2023 journal article
HMT: A Hardware-centric Hybrid Bonsai Merkle Tree Algorithm for High-performance Authentication
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 22(4).
2023 article
Plutus: Bandwidth-Efficient Memory Security for GPUs
2023 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA, pp. 543–555.
2023 journal article
RC-NVM: Recovery-Aware Reliability-Security Co-Design for Non-Volatile Memories
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 21(4), 1817–1830.
2023 article
SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs
2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS.
2023 article
Thoth: Bridging the Gap Between Persistently Secure Memories and Memory Interfaces of Emerging NVMs
2023 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA, pp. 94–107.
2022 article
A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments
2022 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES (VR 2022), pp. 765–774.
2022 journal article
ARES: Persistently Secure Non-Volatile Memory with Processor-transparent and Hardware-friendly Integrity Verification and Metadata Recovery
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 21(1).
2022 article
ATHENA: Enabling Codesign for Next-Generation AI/ML Architectures
2022 IEEE INTERNATIONAL CONFERENCE ON REBOOTING COMPUTING, ICRC, pp. 13–23.
2022 article
Adaptive Security Support for Heterogeneous Memory on GPUs
2022 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2022), pp. 213–228.
2022 journal article
DirectNVM: Hardware-accelerated NVMe SSDs for High-performance Embedded Computing
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 21(1).
2022 article
Eris: Fault Injection and Tracking Framework for Reliability Analysis of Open-Source Hardware
2022 IEEE INTERNATIONAL SYMPOSIUM ON PERFORMANCE ANALYSIS OF SYSTEMS AND SOFTWARE (ISPASS 2022), pp. 210–220.
2022 article
Filesystem Encryption or Direct-Access for NVM Filesystems? Let's Have Both!
2022 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2022), pp. 490–502.
2022 article
High-Fidelity Model Extraction Attacks via Remote Power Monitors
2022 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE CIRCUITS AND SYSTEMS (AICAS 2022): INTELLIGENT TECHNOLOGY IN THE POST-PANDEMIC ERA, pp. 328–331.
2022 article
Horus: Persistent Security for Extended Persistence-Domain Memory Systems
2022 55TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), pp. 1255–1269.
2022 article
Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures
2022 IEEE 36TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS 2022), pp. 258–268.
2022 article
Towards Resilient Analog In-Memory Deep Learning via Data Layout Re-Organization
PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, pp. 859–864.
2022 article
Transpose-Xen: Virtualized Mixed-Criticality through Dynamic Allocation
37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, pp. 3–12.
2022 journal article
Understanding Internet of Things malware by analyzing endpoints in their static artifacts
COMPUTER NETWORKS, 206.
2021 article
DeACT: Architecture-Aware Virtual Memory Support for Fabric Attached Memory Systems
2021 27TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2021), pp. 453–466.
2021 article
HERMES: Hardware-Efficient Speculative Dataflow Architecture for Bonsai Merkle Tree-Based Memory Authentication
2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), pp. 203–213.
2021 article
NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks
2021 ACM/IEEE 48TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2021), pp. 776–789.
2021 article
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter
PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), pp. 1697–1702.
2021 journal article
Resilient and Secure Hardware Devices Using ASL
ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 17(2).
2021 journal article
SHELLCORE: Automating Malicious IoT Software Detection Using Shell Commands Representation
IEEE INTERNET OF THINGS JOURNAL, 9(4), 2485–2496.
2021 article
Seeds of SEED: R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change Memories
2021 INTERNATIONAL SYMPOSIUM ON SECURE AND PRIVATE EXECUTION ENVIRONMENT DESIGN (SEED 2021), pp. 22–28.
2021 article
Stealth-Persist: Architectural Support for Persistent Applications in Hybrid Memory Systems
2021 27TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2021), pp. 139–152.
2021 article proceedings
VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets
Event: 2021 IEEE Virtual Reality and 3D User Interfaces (VR)
2020 journal article
A Lightweight Memory Access Pattern Obfuscation Framework for NVM
IEEE COMPUTER ARCHITECTURE LETTERS, 19(2), 163–166.
2020 article
Guest Editors' Introduction to the Special Issue on Hardware Security
Awad, A., & Wang, R. (2020, November 1). IEEE TRANSACTIONS ON COMPUTERS, Vol. 69, pp. 1556–1557.
2020 journal article
Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 19(2), 1049–1063.
2016 article
Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers
Awad, A., Manadhata, P., Haber, S., Solihin, Y., & Horne, W. (2016, April). ACM SIGPLAN NOTICES, Vol. 51, pp. 263–276.
2016 conference paper
Silent shredder: Zero-cost shredding for secure non-volatile main memory controllers
Operating Systems Review, 50(2), 263–276.
2015 conference paper
Non-volatile memory host controller interface performance analysis in high-performance I/O systems
Ieee international symposium on performance analysis of systems and, 145–154.
2014 conference paper
STM : Cloning the spatial and temporal memory access behavior
International symposium on high-performance computer, 237–247.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.