Follow
Jesse Elwell
Jesse Elwell
Graduate Student in Computer Science, SUNY Binghamton
Verified email at binghamton.edu
Title
Cited by
Cited by
Year
On the detection of kernel-level rootkits using hardware performance counters
B Singh, D Evtyushkin, J Elwell, R Riley, I Cervesato
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
1482017
Iso-x: A flexible architecture for hardware-managed isolated execution
D Evtyushkin, J Elwell, M Ozsoy, D Ponomarev, NA Ghazaleh, R Riley
2014 47th Annual IEEE/ACM International Symposium on Microarchitecture, 190-202, 2014
1252014
Ric: Relaxed inclusion caches for mitigating llc side-channel attacks
M Kayaalp, KN Khasawneh, HA Esfeden, J Elwell, N Abu-Ghazaleh, ...
Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017
852017
A Non-Inclusive Memory Permissions Architecture for Protection Against Cross-Layer Attacks
J Elwell, R Riley, N Abu-Ghazaleh, D Ponomarev
High Performance Computer Architecture (HPCA), 2014 IEEE 20th International …, 2014
202014
Flexible hardware-managed isolated execution: Architecture, software support and applications
D Evtyushkin, J Elwell, M Ozsoy, D Ponomarev, NA Ghazaleh, R Riley
IEEE Transactions on Dependable and Secure Computing 15 (3), 437-451, 2016
172016
TPM-SIM: A framework for performance evaluation of trusted platform modules
J Schmitz, J Loew, J Elwell, D Ponomarev, N Abu-Ghazaleh
Proceedings of the 48th Design Automation Conference, 236-241, 2011
172011
Computing with time: Microarchitectural weird machines
D Evtyushkin, T Benjamin, J Elwell, JA Eitel, A Sapello, A Ghosh
Proceedings of the 26th ACM International Conference on Architectural …, 2021
112021
Rethinking memory permissions for protection against cross-layer attacks
J Elwell, R Riley, N Abu-Ghazaleh, D Ponomarev, I Cervesato
ACM Transactions on Architecture and Code Optimization (TACO) 12 (4), 1-27, 2015
82015
A co-processor approach for accelerating data-structure intensive algorithms
J Loew, J Elwell, D Ponomarev, PH Madden
2010 IEEE International Conference on Computer Design, 431-438, 2010
52010
Investigating the Synergy between Routing and Forwarding Strategy in NDN Networks
L Wang, A Lane, C Serban, J Elwell, A Afanasyev, L Zhang
Proceedings of the 10th ACM Conference on Information-Centric Networking, 67-77, 2023
12023
Hardening extended memory access control schemes with self-verified address spaces
J Elwell, D Evtyushkin, D Ponomarev, N Abu-Ghazaleh, R Riley
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 392-399, 2017
12017
Secure NDN Packet Encapsulation
D Townley, Y Kim, F Douglis, J Elwell, C Serban, L Wang, A Afanasyev, ...
ICC 2023-IEEE International Conference on Communications, 1106-1111, 2023
2023
Generalized Insider Attack Detection Implementation using NetFlow Data
Y Samtani, J Elwell
arXiv preprint arXiv:2010.15697, 2020
2020
Runtime Attestation for IAAS Clouds.
J Elwell, A Sapello, A Poylisher, G Di Crescenzo, A Ghosh, A Kubota, ...
CLOSER, 233-247, 2018
2018
ROP Defense in the Cloud through LIve Text Page-level Re-ordering
A Sapello, CJ Chiang, J Elwell, A Ghosh, A Kubota, T Matsunaka
Proceedings of the 7th International Conference on Cloud Computing and …, 2017
2017
Securing systems with non-inclusive memory permissions
J Elwell
State University of New York at Binghamton, 2016
2016
Mathematical limits of parallel computation for embedded systems
J Loew, J Elwell, D Ponomarev, PH Madden
16th Asia and South Pacific Design Automation Conference (ASP-DAC 2011), 653-660, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–17