Author:
Zhou Yanqi,Wagh Sameer,Mittal Prateek,Wentzlaff David
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Triton: Software-Defined Threat Model for Secure Multi-Tenant ML Inference Accelerators;Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy;2023-10-29
2. Hardware Support for Constant-Time Programming;56th Annual IEEE/ACM International Symposium on Microarchitecture;2023-10-28
3. Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer;Proceedings of the 29th Symposium on Operating Systems Principles;2023-10-23
4. Mayalok: A Cyber-Deception Hardware Using Runtime Instruction Infusion;2023 IEEE 34th International Conference on Application-specific Systems, Architectures and Processors (ASAP);2023-07
5. Characterization of Timing-based Software Side-channel Attacks and Mitigations on Network-on-Chip Hardware;ACM Journal on Emerging Technologies in Computing Systems;2023-06-21