Understanding contention-based channels and using them for defense C Hunger, M Kazdagli, A Rawat, A Dimakis, S Vishwanath, M Tiwari 2015 IEEE 21st International Symposium on High Performance Computer …, 2015 | 99 | 2015 |
DATS-data containers for web applications C Hunger, L Vilanova, C Papamanthou, Y Etsion, M Tiwari Proceedings of the twenty-third international conference on architectural …, 2018 | 14 | 2018 |
Intelligent coded memory architecture with enhanced access scheduler H Luan, A Gatherer, S Vishwanath, C Hunger, H Jain US Patent 10,437,480, 2019 | 10 | 2019 |
Intelligent memory architecture for increased efficiency H Luan, A Gatherer, S Vishwanath, C Hunger, H Jain US Patent 10,180,803, 2019 | 5 | 2019 |
Dynamic coding algorithm for intelligent coded memory system H Luan, A Gatherer, S Vishwanath, C Hunger, H Jain US Patent 9,921,754, 2018 | 4 | 2018 |
ACHyb: A hybrid analysis approach to detect kernel access control vulnerabilities Y Hu, W Wang, C Hunger, R Wood, S Khurshid, M Tiwari Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021 | 2 | 2021 |
Intelligent code apparatus, method, and computer program for memory H Luan, A Gatherer, S Vishwanath, C Hunger, H Jain US Patent 9,760,432, 2017 | 1 | 2017 |
DATS—Programmability and Security by Design for Web Applications C Hunger, L Vilanova, C Papamanthou, Y Etsion, M Tiwari | | |