Follow
Mehmet Kayaalp
Mehmet Kayaalp
Verified email at intel.com
Title
Cited by
Cited by
Year
Containerleaks: Emerging security threats of information leakages in container clouds
X Gao, Z Gu, M Kayaalp, D Pendarakis, H Wang
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
1622017
A high-resolution side-channel attack on last-level cache
M Kayaalp, N Abu-Ghazaleh, D Ponomarev, A Jaleel
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
1592016
Branch regulation: Low-overhead protection from code reuse attacks
M Kayaalp, M Ozsoy, N Abu-Ghazaleh, D Ponomarev
ACM SIGARCH Computer Architecture News 40 (3), 94-105, 2012
1322012
SCRAP: Architecture for signature-based protection from code reuse attacks
M Kayaalp, T Schmitt, J Nomani, D Ponomarev, N Abu-Ghazaleh
2013 IEEE 19th International Symposium on High Performance Computer …, 2013
872013
Ric: Relaxed inclusion caches for mitigating llc side-channel attacks
M Kayaalp, KN Khasawneh, HA Esfeden, J Elwell, N Abu-Ghazaleh, ...
Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017
832017
A collaborative and content based event recommendation system integrated with data collection scrapers and services at a social networking site
M Kayaalp, T Ozyer, ST Ozyer
2009 International Conference on Advances in Social Network Analysis and …, 2009
612009
A study on the security implications of information leakages in container clouds
X Gao, B Steenkamer, Z Gu, M Kayaalp, D Pendarakis, H Wang
IEEE Transactions on Dependable and Secure Computing 18 (1), 174-191, 2018
492018
Efficiently securing systems from code reuse attacks
M Kayaalp, M Ozsoy, NA Ghazaleh, D Ponomarev
IEEE Transactions on Computers 63 (5), 1144-1156, 2012
382012
Data processing and communication strategies for lifetime optimization in wireless sensor networks
B Tavli, M Kayaalp, O Ceylan, IE Bagci
AEU-International Journal of Electronics and Communications 64 (10), 992-998, 2010
312010
A mash-up application utilizing hybridized filtering techniques for recommending events at a social networking site
M Kayaalp, T Özyer, ST Özyer
Social Network Analysis and Mining, 1-9, 2010
212010
Signature-based protection from code reuse attacks
M Kayaalp, T Schmitt, J Nomani, D Ponomarev, NA Ghazaleh
IEEE Transactions on Computers 64 (2), 533-546, 2013
172013
File Signatures Needed!
S Berger, M Kayaalp, D Pendarakis, M Zohar
Linux Plumbers Conference, 2016
52016
Improving the soft error resilience of the register files using sram bitcells with built-in comparators
M Kayaalp, F Koc, O Ergin
2012 15th Euromicro Conference on Digital System Design, 140-143, 2012
42012
Data processing and communication strategies for lifetime optimization in wireless sensor networks
M Kayaalp, O Ceylan, IE Bagci, B Tavli
2009 IEEE 17th Signal Processing and Communications Applications Conference …, 2009
32009
Hardware Support For Malware Defense and End-To-End Trust
R Boivie, E Ekanadham, B Jain, E Hall, GDH Hunt, M Kapur, M Kayaalp, ...
Technical Report. IBM TJ Watson Research Center, 2017
22017
Dynamic register file partitioning in superscalar microprocessors for energy efficiency
M Özsoy, YO Koçberber, M Kayaalp, O Ergin
Computer Design (ICCD), 2010 IEEE International Conference on, 515-520, 2010
22010
Using logisim-evolution for teaching datapath and control
M Kayaalp
2021 ACM/IEEE Workshop on Computer Architecture Education (WCAE), 1-8, 2021
12021
Exploiting bus level and bit level inactivity for preventing wire degradation due to electromigration
M Kayaalp, F Koc, O Ergin
2012 15th Euromicro Conference on Digital System Design, 280-287, 2012
12012
Kernel-based power consumption and isolation and defense against emerging power attacks
X Gao, Z Gu, M Kayaalp, D Pendarakis
US Patent 11,669,426, 2023
2023
Architectural techniques for protecting systems against emerging attacks
M Kayaalp
State University of New York at Binghamton, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20