Privacy in deep learning: A survey F Mireshghallah, M Taram, P Vepakomma, A Singh, R Raskar, ... arXiv preprint arXiv:2004.12254, 2020 | 138 | 2020 |
Context-sensitive fencing: Securing speculative execution via microcode customization M Taram, A Venkat, D Tullsen Proceedings of the Twenty-Fourth International Conference on Architectural …, 2019 | 132 | 2019 |
Shredder: Learning noise distributions to protect inference privacy F Mireshghallah, M Taram, P Ramrakhyani, A Jalali, D Tullsen, ... Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020 | 104* | 2020 |
I See Dead μops: Leaking Secrets via Intel/AMD Micro-Op Caches X Ren, L Moody, M Taram, M Jordan, DM Tullsen, A Venkat 2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture …, 2021 | 69 | 2021 |
Toot: an efficient and scalable power-gating method for noc routers H Farrokhbakht, M Taram, B Khaleghi, S Hessabi 2016 Tenth IEEE/ACM International Symposium on Networks-on-Chip (NOCS), 1-8, 2016 | 51 | 2016 |
Not all features are equal: Discovering essential features for preserving prediction privacy F Mireshghallah, M Taram, A Jalali, ATT Elthakeb, D Tullsen, ... Proceedings of the Web Conference 2021, 669-680, 2021 | 40 | 2021 |
SecSMT: Securing SMT Processors against Contention-Based Covert Channels M Taram, X Ren, A Venkat, D Tullsen 31st USENIX Security Symposium (USENIX Security 22), 2022 | 29 | 2022 |
Mobilizing the Micro-Ops: Exploiting Context Sensitive Decoding for Security and Energy Efficiency M Taram, A Venkat, D Tullsen 2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture …, 2018 | 26* | 2018 |
Packet Chasing: Spying on network packets over a cache side-channel M Taram, A Venkat, D Tullsen 2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture …, 2020 | 22* | 2020 |
Blokus Duo game on FPGA A Jahanshahi, MK Taram, N Eskandari The 17th CSI International Symposium on Computer Architecture & Digital …, 2013 | 18 | 2013 |
NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems Z Wang, M Taram, D Moghimi, S Swanson, D Tullsen, J Zhao 32th USENIX Security Symposium (USENIX Security 23), 2023 | 16 | 2023 |
A compile-time optimization method for WCET reduction in real-time embedded systems through block formation MM Kafshdooz, M Taram, S Assadi, A Ejlali ACM Transactions on Architecture and Code Optimization (TACO) 12 (4), 1-25, 2016 | 16 | 2016 |
A principled approach to learning stochastic representations for privacy in deep neural inference F Mireshghallah, M Taram, A Jalali, AT Elthakeb, D Tullsen, ... arXiv preprint arXiv:2003.12154, 2020 | 14 | 2020 |
Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI S Narayan, T Garfinkel, M Taram, J Rudek, D Moghimi, E Johnson, ... Proceedings of the 28th ACM International Conference on Architectural …, 2023 | 13 | 2023 |
Context-Sensitive Decoding: On-Demand Microcode Customization for Security and Energy Management M Taram, A Venkat, DM Tullsen IEEE Micro 39 (3), 75-83, 2019 | 9 | 2019 |
Half&Half: Demystifying Intel’s Directional Branch Predictors for Fast, Secure Partitioned Execution H Yavarzadeh, M Taram, S Narayan, D Stefan, D Tullsen 2023 IEEE Symposium on Security and Privacy (SP), 1220-1237, 2023 | 8 | 2023 |
Fast and efficient deployment of security defenses via context sensitive decoding M Taram, D Tullsen, A Venkat, H Sayadi, H Wang, S Manoj, H Homayoun Proceedings of the 44th Government Microcircuit Applications and Critical …, 2019 | 7 | 2019 |
Mitigating speculative execution attacks via context-sensitive fencing M Taram, A Venkat, D Tullsen IEEE Design & Test, 2022 | 4 | 2022 |
Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor H Yavarzadeh, A Agarwal, M Christman, C Garman, D Genkin, A Kwong, ... Proceedings of the 29th ACM International Conference on Architectural …, 2024 | 1 | 2024 |
Defusing the Tension between Security and Performance with Secure Microarchitectures M Taram UC San Diego, 2022 | | 2022 |