Are coherence protocol states vulnerable to information leakage? F Yao, M Doroslovacki, G Venkataramani 2018 IEEE International Symposium on High Performance Computer Architecture …, 2018 | 101 | 2018 |
Deephammer: Depleting the intelligence of deep neural networks through targeted chain of bit flips F Yao, AS Rakin, D Fan 29th {USENIX} Security Symposium ({USENIX} Security 20), 2020 | 76 | 2020 |
A comparative analysis of data center network architectures F Yao, J Wu, G Venkataramani, S Subramaniam 2014 IEEE International Conference on Communications (ICC), 3106-3111, 2014 | 68 | 2014 |
Covert timing channels exploiting non-uniform memory access based architectures F Yao, G Venkataramani, M Doroslovački Proceedings of the on Great Lakes Symposium on VLSI 2017, 155-160, 2017 | 42 | 2017 |
Statsym: vulnerable path discovery through statistics-guided symbolic execution F Yao, Y Li, Y Chen, H Xue, T Lan, G Venkataramani 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 41 | 2017 |
Prefetch-guard: Leveraging hardware prefetches to defend against cache timing channels H Fang, SS Dayapule, F Yao, M Doroslovački, G Venkataramani 2018 IEEE International Symposium on Hardware Oriented Security and Trust …, 2018 | 40 | 2018 |
WASP: Workload adaptive energy-latency optimization in server farms using server low-power states F Yao, J Wu, S Subramaniam, G Venkataramani 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 171-178, 2017 | 40 | 2017 |
T-BFA: Targeted Bit-Flip Adversarial Weight Attack AS Rakin, Z He, J Li, F Yao, C Chakrabarti, D Fan IEEE Transactions on Pattern Analysis and Machine Intelligence 44 (11), 7928 …, 2021 | 38 | 2021 |
XBFS: eXploring runtime optimizations for breadth-first search on GPUs A Gaihre, Z Wu, F Yao, H Liu Proceedings of the 28th International symposium on high-performance parallel …, 2019 | 38 | 2019 |
Jop-alarm: Detecting jump-oriented programming-based anomalies in applications F Yao, J Chen, G Venkataramani 2013 IEEE 31st International Conference on Computer Design (ICCD), 467-470, 2013 | 38 | 2013 |
Simber: Eliminating redundant memory bound checks via statistical inference H Xue, Y Chen, F Yao, Y Li, T Lan, G Venkataramani ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International …, 2017 | 34 | 2017 |
Sarre: semantics-aware rule recommendation and enforcement for event paths on android Y Li, F Yao, T Lan, G Venkataramani IEEE Transactions on Information Forensics and Security 11 (12), 2748-2762, 2016 | 30 | 2016 |
Prodact: Prefetch-obfuscator to defend against cache timing channels H Fang, SS Dayapule, F Yao, M Doroslovački, G Venkataramani International Journal of Parallel Programming 47, 571-594, 2019 | 20 | 2019 |
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories AS Rakin, MHI Chowdhuryy, F Yao, D Fan arXiv preprint arXiv:2111.04625, 2021 | 19 | 2021 |
Cotsknight: Practical defense against cache timing channel attacks using cache monitoring and partitioning technologies F Yao, H Fang, M Doroslovački, G Venkataramani 2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019 | 18 | 2019 |
Covert timing channels exploiting cache coherence hardware: Characterization and defense F Yao, M Doroslovački, G Venkataramani International Journal of Parallel Programming 47, 595-620, 2019 | 17 | 2019 |
Branchspec: Information leakage attacks exploiting speculative branch instruction executions MHI Chowdhuryy, H Liu, F Yao 2020 IEEE 38th International Conference on Computer Design (ICCD), 529-536, 2020 | 16 | 2020 |
A dual delay timer strategy for optimizing server farm energy F Yao, J Wu, G Venkataramani, S Subramaniam 2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015 | 16 | 2015 |
Watts-inside: A hardware-software cooperative approach for multicore power debugging J Chen, F Yao, G Venkataramani 2013 IEEE 31st International Conference on Computer Design (ICCD), 335-342, 2013 | 16 | 2013 |
Inter-task cache interference aware partitioned real-time scheduling Z Guo, K Yang, F Yao, A Awad Proceedings of the 35th annual ACM symposium on applied computing, 218-226, 2020 | 15 | 2020 |