Dynamic reduction of voltage margins by leveraging on-chip ECC in Itanium II processors A Bacha, R Teodorescu Proceedings of the 40th annual international symposium on computer …, 2013 | 111 | 2013 |
Adaptive parallel execution of deep neural networks on heterogeneous edge devices L Zhou, MH Samavatian, A Bacha, S Majumdar, R Teodorescu Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 195-208, 2019 | 108 | 2019 |
Specshield: Shielding speculative data from microarchitectural covert channels K Barber, A Bacha, L Zhou, Y Zhang, R Teodorescu 2019 28th International Conference on Parallel Architectures and Compilation …, 2019 | 101 | 2019 |
Using ECC feedback to guide voltage speculation in low-voltage processors A Bacha, R Teodorescu 2014 47th Annual IEEE/ACM International Symposium on Microarchitecture, 306-318, 2014 | 78 | 2014 |
Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses AA Elkhail, RUD Refat, R Habre, A Hafeez, A Bacha, H Malik IEEE Access 9, 162401-162437, 2021 | 61 | 2021 |
“Why Should I Read the Privacy Policy, I Just Need the Service”: A Study on Attitudes and Perceptions Toward Privacy Policies D Ibdah, N Lachtar, SM Raparthi, A Bacha IEEE access 9, 166465-166487, 2021 | 50 | 2021 |
Authenticache: Harnessing cache ECC for system authentication A Bacha, R Teodorescu Proceedings of the 48th International Symposium on Microarchitecture, 128-140, 2015 | 43 | 2015 |
A cross-stack approach towards defending against cryptojacking N Lachtar, AA Elkhail, A Bacha, H Malik IEEE Computer Architecture Letters 19 (2), 126-129, 2020 | 32 | 2020 |
The case for native instructions in the detection of mobile ransomware N Lachtar, D Ibdah, A Bacha IEEE Letters of the Computer Society 2 (2), 16-19, 2019 | 27 | 2019 |
Toward mobile malware detection through convolutional neural networks N Lachtar, D Ibdah, A Bacha IEEE Embedded Systems Letters 13 (3), 134-137, 2020 | 22 | 2020 |
Baseboard management controller to deconfigure field replaceable units according to deep learning model A Bacha, DH Umar US Patent 10,552,729, 2020 | 19 | 2020 |
Isolating speculative data to prevent transient execution attacks K Barber, A Bacha, L Zhou, Y Zhang, R Teodorescu IEEE Computer Architecture Letters 18 (2), 178-181, 2019 | 18 | 2019 |
Assigning processors to memory mapped configuration A Bacha, TM Pham, TJ Gorenc US Patent 9,940,291, 2018 | 18 | 2018 |
Log events for root cause error diagnosis A Bacha US Patent 10,579,459, 2020 | 16 | 2020 |
Seamlessly safeguarding data against ransomware attacks AA Elkhail, N Lachtar, D Ibdah, R Aslam, H Khan, A Bacha, H Malik IEEE Transactions on Dependable and Secure Computing 20 (1), 1-16, 2023 | 15 | 2023 |
Rnnfast: An accelerator for recurrent neural networks using domain-wall memory MH Samavatian, A Bacha, L Zhou, R Teodorescu ACM Journal on Emerging Technologies in Computing Systems (JETC) 16 (4), 1-27, 2020 | 14 | 2020 |
Nvcool: When non-volatile caches meet cold boot attacks X Pan, A Bacha, S Rudolph, L Zhou, Y Zhang, R Teodorescu 2018 IEEE 36th International Conference on Computer Design (ICCD), 439-448, 2018 | 14 | 2018 |
Determine voltage supplied to a core A Bacha US Patent 9,342,123, 2016 | 13 | 2016 |
Ransomshield: A visualization approach to defending mobile systems against ransomware N Lachtar, D Ibdah, H Khan, A Bacha ACM Transactions on Privacy and Security 26 (3), 1-30, 2023 | 8 | 2023 |
Dark firmware: a systematic approach to exploring application security risks in the presence of untrusted firmware D Ibdah, N Lachtar, AA Elkhail, A Bacha, H Malik 23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020 | 8 | 2020 |