Follow
Misiker Tadesse Aga
Misiker Tadesse Aga
University of Michigan
Verified email at fb.com
Title
Cited by
Cited by
Year
Nethammer: Inducing rowhammer faults through network requests
M Lipp, MT Aga, M Schwarz, L Raab, L Lamster, C Maurice, D Gruss
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
1332020
Morpheus: A vulnerability-tolerant secure architecture based on ensembles of moving target defenses with churn
M Gallagher, L Biernacki, S Chen, ZB Aweke, SF Yitbarek, MT Aga, ...
Proceedings of the Twenty-Fourth International Conference on Architectural …, 2019
782019
Cold boot attacks are still hot: Security analysis of memory scramblers in modern processors
SF Yitbarek, MT Aga, R Das, T Austin
2017 IEEE International Symposium on High Performance Computer Architecture …, 2017
762017
When good protections go bad: Exploiting anti-DoS measures to accelerate Rowhammer attacks
MT Aga, ZB Aweke, T Austin
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
612017
Smokestack: thwarting DOP attacks with runtime stack layout randomization
MT Aga, T Austin
2019 IEEE/ACM International Symposium on Code Generation and Optimization …, 2019
222019
Morpheus II: A RISC-V security extension for protecting vulnerable software and hardware
A Harris, T Verma, S Wei, L Biernacki, A Kisil, MT Aga, V Bertacco, ...
2021 IEEE International Symposium on Hardware Oriented Security and Trust …, 2021
112021
Reetuparna Das et Todd Austin (fév. 2017).«Cold Boot Attacks are Still Hot: Security Analysis of Memory Scramblers in Modern Processors»
SF Yitbarek, MT Aga
2017 IEEE International Symposium on High Performance Computer Architecture …, 0
4
Software-driven security attacks: From vulnerability sources to durable hardware defenses
L Biernacki, M Gallagher, Z Xu, MT Aga, A Harris, S Wei, M Tiwari, ...
ACM Journal on Emerging Technologies in Computing Systems (JETC) 17 (3), 1-38, 2021
22021
High performance automatic target recognition
M Tadesse, E Adugna
AFRICON 2015, 1-5, 2015
22015
Smokestack: thwarting DOP attacks with runtime stack layout randomization. In 2019 IEEE
MT Aga, T Austin
ACM International Symposium on Code Generation and Optimization (CGO), 26-36, 0
2
Thwarting Advanced Code-reuse Attacks
MT Aga
12019
Wrangling in the power of code pointers with proxycfi
MT Aga, C Holoday, T Austin
Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 …, 2019
12019
Cold Boot Attacks are Still Hot: Security Analysis of Memory Scramblers in Modern Processors
SFYMT Aga, R Das, T Austin
Optimizing Control Data Isolation on GCC
M Aga, SA Hazboun, L Millar, A Yarger
The system can't perform the operation now. Try again later.
Articles 1–14