Jesse Elwell
Jesse Elwell
Graduate Student in Computer Science, SUNY Binghamton
Dirección de correo verificada de
Citado por
Citado por
On the detection of kernel-level rootkits using hardware performance counters
B Singh, D Evtyushkin, J Elwell, R Riley, I Cervesato
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Iso-x: A flexible architecture for hardware-managed isolated execution
D Evtyushkin, J Elwell, M Ozsoy, D Ponomarev, NA Ghazaleh, R Riley
2014 47th Annual IEEE/ACM International Symposium on Microarchitecture, 190-202, 2014
Ric: Relaxed inclusion caches for mitigating llc side-channel attacks
M Kayaalp, KN Khasawneh, HA Esfeden, J Elwell, N Abu-Ghazaleh, ...
Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017
A Non-Inclusive Memory Permissions Architecture for Protection Against Cross-Layer Attacks
J Elwell, R Riley, N Abu-Ghazaleh, D Ponomarev
High Performance Computer Architecture (HPCA), 2014 IEEE 20th International …, 2014
Flexible hardware-managed isolated execution: Architecture, software support and applications
D Evtyushkin, J Elwell, M Ozsoy, D Ponomarev, NA Ghazaleh, R Riley
IEEE Transactions on Dependable and Secure Computing 15 (3), 437-451, 2016
TPM-SIM: A framework for performance evaluation of trusted platform modules
J Schmitz, J Loew, J Elwell, D Ponomarev, N Abu-Ghazaleh
Proceedings of the 48th Design Automation Conference, 236-241, 2011
Computing with time: Microarchitectural weird machines
D Evtyushkin, T Benjamin, J Elwell, JA Eitel, A Sapello, A Ghosh
Proceedings of the 26th ACM International Conference on Architectural …, 2021
Rethinking memory permissions for protection against cross-layer attacks
J Elwell, R Riley, N Abu-Ghazaleh, D Ponomarev, I Cervesato
ACM Transactions on Architecture and Code Optimization (TACO) 12 (4), 1-27, 2015
A co-processor approach for accelerating data-structure intensive algorithms
J Loew, J Elwell, D Ponomarev, PH Madden
2010 IEEE International Conference on Computer Design, 431-438, 2010
Investigating the Synergy between Routing and Forwarding Strategy in NDN Networks
L Wang, A Lane, C Serban, J Elwell, A Afanasyev, L Zhang
Proceedings of the 10th ACM Conference on Information-Centric Networking, 67-77, 2023
Hardening extended memory access control schemes with self-verified address spaces
J Elwell, D Evtyushkin, D Ponomarev, N Abu-Ghazaleh, R Riley
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 392-399, 2017
Secure NDN Packet Encapsulation
D Townley, Y Kim, F Douglis, J Elwell, C Serban, L Wang, A Afanasyev, ...
ICC 2023-IEEE International Conference on Communications, 1106-1111, 2023
Generalized Insider Attack Detection Implementation using NetFlow Data
Y Samtani, J Elwell
arXiv preprint arXiv:2010.15697, 2020
Runtime Attestation for IAAS Clouds.
J Elwell, A Sapello, A Poylisher, G Di Crescenzo, A Ghosh, A Kubota, ...
CLOSER, 233-247, 2018
ROP Defense in the Cloud through LIve Text Page-level Re-ordering
A Sapello, CJ Chiang, J Elwell, A Ghosh, A Kubota, T Matsunaka
Proceedings of the 7th International Conference on Cloud Computing and …, 2017
Securing systems with non-inclusive memory permissions
J Elwell
State University of New York at Binghamton, 2016
Mathematical limits of parallel computation for embedded systems
J Loew, J Elwell, D Ponomarev, PH Madden
16th Asia and South Pacific Design Automation Conference (ASP-DAC 2011), 653-660, 2011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–17