Jump-oriented programming: a new class of code-reuse attack T Bletsch, X Jiang, VW Freeh, Z Liang Proceedings of the 6th ACM symposium on information, computer and …, 2011 | 874 | 2011 |
Adagio: making DVS practical for complex HPC applications B Rountree, DK Lownenthal, BR De Supinski, M Schulz, VW Freeh, ... Proceedings of the 23rd international conference on Supercomputing, 460-469, 2009 | 405 | 2009 |
Just-in-time dynamic voltage scaling: Exploiting inter-node slack to save energy in mpi programs VW Freeh, N Kappiah, DK Lowenthal, TK Bletsch Journal of Parallel and Distributed Computing 68 (9), 1175-1185, 2008 | 370 | 2008 |
On the expressiveness of return-into-libc attacks M Tran, M Etheridge, T Bletsch, X Jiang, V Freeh, P Ning Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011 | 253 | 2011 |
Mitigating code-reuse attacks with control-flow locking T Bletsch, X Jiang, V Freeh Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 230 | 2011 |
The effect of aging on low-fat, reduced-fat, and full-fat Cheddar cheese texture NR Rogers, MA Drake, CR Daubert, DJ McMahon, TK Bletsch, ... Journal of Dairy Science 92 (10), 4756-4772, 2009 | 123 | 2009 |
Comprehensive and efficient protection of kernel control data J Li, Z Wang, T Bletsch, D Srinivasan, M Grace, X Jiang IEEE Transactions on Information Forensics and Security 6 (4), 1404-1417, 2011 | 72 | 2011 |
Padd: Power aware domain distribution MY Lim, F Rawson, T Bletsch, VW Freeh 2009 29th IEEE International Conference on Distributed Computing Systems …, 2009 | 64 | 2009 |
Method and system for estimating processor utilization from power measurements WM Felter, CR Lefurgy, T Bletsch US Patent 7,925,901, 2011 | 51 | 2011 |
Estimating power consumption of computing components configured in a computing system TK Bletsch, A Dholakia, WM Felter, CR Lefurgy US Patent 8,041,521, 2011 | 50 | 2011 |
Method for equalizing performance of computing components TK Bletsch, WM Felter, NA Gazala, T Horvath, CR Lefurgy US Patent 7,979,729, 2011 | 46 | 2011 |
Scaling and packing on a chip multiprocessor VW Freeh, TK Bletsch, FL Rawson 2007 IEEE International Parallel and Distributed Processing Symposium, 1-8, 2007 | 16 | 2007 |
Learning to mitigate rowhammer attacks BK Joardar, TK Bletsch, K Chakrabarty 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), 564-567, 2022 | 15 | 2022 |
Machine learning-based Rowhammer mitigation BK Joardar, TK Bletsch, K Chakrabarty IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2022 | 14 | 2022 |
Code-reuse attacks: new frontiers and defenses T Bletsch North Carolina State University, 2011 | 13 | 2011 |
Power Aware Domain Migration in a Virtualized Cluster T Bletsch, MY Lim, V Freeh | 3 | 2008 |
Simply-track-and-refresh: Efficient and scalable rowhammer mitigation E Ortega, T Bletsch, B Joardar, J Talukdar, W Paik, K Chakrabarty 2023 IEEE International Test Conference (ITC), 340-349, 2023 | 1 | 2023 |
Rowhammer Vulnerability of DRAMs in 3-D Integration E Ortega, J Talukdar, W Paik, T Bletsch, K Chakrabarty IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2024 | | 2024 |
de Supinski, Martin Schulz, Vincent W B Rountree, DK Lownenthal, R Bronis Freeh, and Tyler Bletsch,“Adagio: Making DVS Practical for Complex HPC …, 2009 | | 2009 |
Using Kernel Instrumentation to Improve CPU Scaling Strategy T Bletsch | | 2006 |