Misiker Tadesse Aga
Misiker Tadesse Aga
Verified email at umich.edu
Cited by
Cited by
Nethammer: Inducing rowhammer faults through network requests
M Lipp, MT Aga, M Schwarz, D Gruss, C Maurice, L Raab, L Lamster
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2020
Cold boot attacks are still hot: Security analysis of memory scramblers in modern processors
SF Yitbarek, MT Aga, R Das, T Austin
2017 IEEE International Symposium on High Performance Computer Architecture …, 2017
When good protections go bad: Exploiting anti-DoS measures to accelerate Rowhammer attacks
MT Aga, ZB Aweke, T Austin
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
Morpheus: A vulnerability-tolerant secure architecture based on ensembles of moving target defenses with churn
M Gallagher, L Biernacki, S Chen, ZB Aweke, SF Yitbarek, MT Aga, ...
Proceedings of the Twenty-Fourth International Conference on Architectural …, 2019
Smokestack: thwarting DOP attacks with runtime stack layout randomization
MT Aga, T Austin
2019 IEEE/ACM International Symposium on Code Generation and Optimization …, 2019
High performance automatic target recognition
M Tadesse, E Adugna
AFRICON 2015, 1-5, 2015
Wrangling in the Power of Code Pointers with ProxyCFI
MT Aga, C Holoday, T Austin
IFIP Annual Conference on Data and Applications Security and Privacy, 317-337, 2019
Thwarting Advanced Code-reuse Attacks
MT Aga
Optimizing Control Data Isolation on GCC
M Aga, SA Hazboun, L Millar, A Yarger
The system can't perform the operation now. Try again later.
Articles 1–9