Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Salessawi Ferede Yitbarek"'
Autor:
Yacob Astatke, Craig Scott, Jumoke Ladeji-Osias, Kenneth Connor, Salessawi Ferede Yitbarek, Albert Sweets, Farzad Moazzami
Publikováno v:
2013 ASEE Annual Conference & Exposition Proceedings.
Autor:
Salessawi Ferede Yitbarek, Baris Kasikci, Mohit Tiwari, Misiker Tadesse Aga, Austin Harris, Valeria Bertacco, Zhixing Xu, Todd Austin, Sharad Malik, Zelalem Birhanu Aweke, Mark Gallagher, Shibo Chen, Lauren Biernacki
Publikováno v:
ASPLOS
Attacks often succeed by abusing the gap between program and machine-level semantics-- for example, by locating a sensitive pointer, exploiting a bug to overwrite this sensitive data, and hijacking the victim program's execution. In this work, we tak
Autor:
Reetuparna Das, Zelalem Birhanu Aweke, Yossi Oren, Matthew Hicks, Todd Austin, Salessawi Ferede Yitbarek, Rui Qiao
Publikováno v:
ASPLOS
Ensuring the integrity and security of the memory system is critical. Recent studies have shown serious security concerns due to "rowhammer" attacks, where repeated accesses to a row of memory cause bit flips in adjacent rows. Recent work by Google's
Autor:
Salessawi Ferede Yitbarek, Todd Austin
Publikováno v:
DAC
Data stored in an off-chip memory, such as DRAM or non-volatile main memory, can potentially be extracted or tampered by an attacker with physical access to a device. Protecting such attacks requires storing message authentication codes and counters
Autor:
Valeria Bertacco, Harrison Davis, Evan Chavis, Salessawi Ferede Yitbarek, Matthew Hicks, Todd Austin, Yijun Hou
Publikováno v:
IVSW
In the continual battle between malware attacks and antivirus technologies, both sides strive to deploy their techniques at always lower layers in the software system stack. The goal is to monitor and control the software executing in the levels abov
Publikováno v:
HPCA
Previous work has demonstrated that systems with unencrypted DRAM interfaces are susceptible to cold boot attacks – where the DRAM in a system is frozen to give it sufficient retention time and is then re-read after reboot, or is transferred to an
Publikováno v:
DATE
Emerging 3D stacked memory systems provide significantly more bandwidth than current DDR modules. However, general purpose processors do not take full advantage of these resources offered by the memory modules. Taking advantage of the increased bandw