On the detection of kernel-level rootkits using hardware performance counters B Singh, D Evtyushkin, J Elwell, R Riley, I Cervesato Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 156 | 2017 |
Iso-x: A flexible architecture for hardware-managed isolated execution D Evtyushkin, J Elwell, M Ozsoy, D Ponomarev, NA Ghazaleh, R Riley 2014 47th Annual IEEE/ACM International Symposium on Microarchitecture, 190-202, 2014 | 132 | 2014 |
Ric: Relaxed inclusion caches for mitigating llc side-channel attacks M Kayaalp, KN Khasawneh, HA Esfeden, J Elwell, N Abu-Ghazaleh, ... Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017 | 89 | 2017 |
A Non-Inclusive Memory Permissions Architecture for Protection Against Cross-Layer Attacks J Elwell, R Riley, N Abu-Ghazaleh, D Ponomarev High Performance Computer Architecture (HPCA), 2014 IEEE 20th International …, 2014 | 21 | 2014 |
TPM-SIM: A framework for performance evaluation of trusted platform modules J Schmitz, J Loew, J Elwell, D Ponomarev, N Abu-Ghazaleh Proceedings of the 48th Design Automation Conference, 236-241, 2011 | 18 | 2011 |
Flexible hardware-managed isolated execution: Architecture, software support and applications D Evtyushkin, J Elwell, M Ozsoy, D Ponomarev, NA Ghazaleh, R Riley IEEE Transactions on Dependable and Secure Computing 15 (3), 437-451, 2016 | 17 | 2016 |
Computing with time: Microarchitectural weird machines D Evtyushkin, T Benjamin, J Elwell, JA Eitel, A Sapello, A Ghosh Proceedings of the 26th ACM International Conference on Architectural …, 2021 | 12 | 2021 |
Rethinking memory permissions for protection against cross-layer attacks J Elwell, R Riley, N Abu-Ghazaleh, D Ponomarev, I Cervesato ACM Transactions on Architecture and Code Optimization (TACO) 12 (4), 1-27, 2015 | 8 | 2015 |
A co-processor approach for accelerating data-structure intensive algorithms J Loew, J Elwell, D Ponomarev, PH Madden 2010 IEEE International Conference on Computer Design, 431-438, 2010 | 5 | 2010 |
Investigating the Synergy between Routing and Forwarding Strategy in NDN Networks L Wang, A Lane, C Serban, J Elwell, A Afanasyev, L Zhang Proceedings of the 10th ACM Conference on Information-Centric Networking, 67-77, 2023 | 3 | 2023 |
Hardening extended memory access control schemes with self-verified address spaces J Elwell, D Evtyushkin, D Ponomarev, N Abu-Ghazaleh, R Riley 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 392-399, 2017 | 1 | 2017 |
Computing with Time: Microarchitectural Weird Machines TS Benjamin, JA Eitel, J Elwell, D Evtyushkin, A Ghosh, A Sapello Communications of the ACM 67 (12), 87-95, 2024 | | 2024 |
Secure NDN Packet Encapsulation D Townley, Y Kim, F Douglis, J Elwell, C Serban, L Wang, A Afanasyev, ... ICC 2023-IEEE International Conference on Communications, 1106-1111, 2023 | | 2023 |
Generalized Insider Attack Detection Implementation using NetFlow Data Y Samtani, J Elwell arXiv preprint arXiv:2010.15697, 2020 | | 2020 |
Runtime Attestation for IAAS Clouds. J Elwell, A Sapello, A Poylisher, G Di Crescenzo, A Ghosh, A Kubota, ... CLOSER, 233-247, 2018 | | 2018 |
ROP Defense in the Cloud through LIve Text Page-level Re-ordering A Sapello, CJ Chiang, J Elwell, A Ghosh, A Kubota, T Matsunaka Proceedings of the 7th International Conference on Cloud Computing and …, 2017 | | 2017 |
Securing systems with non-inclusive memory permissions J Elwell State University of New York at Binghamton, 2016 | | 2016 |
Mathematical limits of parallel computation for embedded systems J Loew, J Elwell, D Ponomarev, PH Madden 16th Asia and South Pacific Design Automation Conference (ASP-DAC 2011), 653-660, 2011 | | 2011 |