Jesse Elwell
Jesse Elwell
Graduate Student in Computer Science, SUNY Binghamton
Verified email at
Cited by
Cited by
On the detection of kernel-level rootkits using hardware performance counters
B Singh, D Evtyushkin, J Elwell, R Riley, I Cervesato
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Iso-x: A flexible architecture for hardware-managed isolated execution
D Evtyushkin, J Elwell, M Ozsoy, D Ponomarev, NA Ghazaleh, R Riley
2014 47th Annual IEEE/ACM International Symposium on Microarchitecture, 190-202, 2014
Ric: Relaxed inclusion caches for mitigating llc side-channel attacks
M Kayaalp, KN Khasawneh, HA Esfeden, J Elwell, N Abu-Ghazaleh, ...
Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017
A Non-Inclusive Memory Permissions Architecture for Protection Against Cross-Layer Attacks
J Elwell, R Riley, N Abu-Ghazaleh, D Ponomarev
High Performance Computer Architecture (HPCA), 2014 IEEE 20th International …, 2014
Flexible hardware-managed isolated execution: Architecture, software support and applications
D Evtyushkin, J Elwell, M Ozsoy, D Ponomarev, NA Ghazaleh, R Riley
IEEE Transactions on Dependable and Secure Computing 15 (3), 437-451, 2016
TPM-SIM: A framework for performance evaluation of trusted platform modules
J Schmitz, J Loew, J Elwell, D Ponomarev, N Abu-Ghazaleh
Proceedings of the 48th Design Automation Conference, 236-241, 2011
Computing with time: Microarchitectural weird machines
D Evtyushkin, T Benjamin, J Elwell, JA Eitel, A Sapello, A Ghosh
Proceedings of the 26th ACM International Conference on Architectural …, 2021
Rethinking memory permissions for protection against cross-layer attacks
J Elwell, R Riley, N Abu-Ghazaleh, D Ponomarev, I Cervesato
ACM Transactions on Architecture and Code Optimization (TACO) 12 (4), 1-27, 2015
A co-processor approach for accelerating data-structure intensive algorithms
J Loew, J Elwell, D Ponomarev, PH Madden
2010 IEEE International Conference on Computer Design, 431-438, 2010
Hardening extended memory access control schemes with self-verified address spaces
J Elwell, D Evtyushkin, D Ponomarev, N Abu-Ghazaleh, R Riley
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 392-399, 2017
Generalized Insider Attack Detection Implementation using NetFlow Data
Y Samtani, J Elwell
arXiv preprint arXiv:2010.15697, 2020
Runtime Attestation for IAAS Clouds.
J Elwell, A Sapello, A Poylisher, G Di Crescenzo, A Ghosh, A Kubota, ...
CLOSER, 233-247, 2018
ROP Defense in the Cloud through LIve Text Page-level Re-ordering
A Sapello, CJ Chiang, J Elwell, A Ghosh, A Kubota, T Matsunaka
Proceedings of the 7th International Conference on Cloud Computing and …, 2017
Securing systems with non-inclusive memory permissions
J Elwell
State University of New York at Binghamton, 2016
Mathematical limits of parallel computation for embedded systems
J Loew, J Elwell, D Ponomarev, PH Madden
16th Asia and South Pacific Design Automation Conference (ASP-DAC 2011), 653-660, 2011
The system can't perform the operation now. Try again later.
Articles 1–15