Suivre
Anys Bacha
Anys Bacha
Adresse e-mail validée de umich.edu - Page d'accueil
Titre
Citée par
Citée par
Année
Dynamic reduction of voltage margins by leveraging on-chip ECC in Itanium II processors
A Bacha, R Teodorescu
Proceedings of the 40th annual international symposium on computer …, 2013
1112013
Adaptive parallel execution of deep neural networks on heterogeneous edge devices
L Zhou, MH Samavatian, A Bacha, S Majumdar, R Teodorescu
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 195-208, 2019
1082019
Specshield: Shielding speculative data from microarchitectural covert channels
K Barber, A Bacha, L Zhou, Y Zhang, R Teodorescu
2019 28th International Conference on Parallel Architectures and Compilation …, 2019
1012019
Using ECC feedback to guide voltage speculation in low-voltage processors
A Bacha, R Teodorescu
2014 47th Annual IEEE/ACM International Symposium on Microarchitecture, 306-318, 2014
782014
Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses
AA Elkhail, RUD Refat, R Habre, A Hafeez, A Bacha, H Malik
IEEE Access 9, 162401-162437, 2021
612021
“Why Should I Read the Privacy Policy, I Just Need the Service”: A Study on Attitudes and Perceptions Toward Privacy Policies
D Ibdah, N Lachtar, SM Raparthi, A Bacha
IEEE access 9, 166465-166487, 2021
502021
Authenticache: Harnessing cache ECC for system authentication
A Bacha, R Teodorescu
Proceedings of the 48th International Symposium on Microarchitecture, 128-140, 2015
432015
A cross-stack approach towards defending against cryptojacking
N Lachtar, AA Elkhail, A Bacha, H Malik
IEEE Computer Architecture Letters 19 (2), 126-129, 2020
322020
The case for native instructions in the detection of mobile ransomware
N Lachtar, D Ibdah, A Bacha
IEEE Letters of the Computer Society 2 (2), 16-19, 2019
272019
Toward mobile malware detection through convolutional neural networks
N Lachtar, D Ibdah, A Bacha
IEEE Embedded Systems Letters 13 (3), 134-137, 2020
222020
Baseboard management controller to deconfigure field replaceable units according to deep learning model
A Bacha, DH Umar
US Patent 10,552,729, 2020
192020
Isolating speculative data to prevent transient execution attacks
K Barber, A Bacha, L Zhou, Y Zhang, R Teodorescu
IEEE Computer Architecture Letters 18 (2), 178-181, 2019
182019
Assigning processors to memory mapped configuration
A Bacha, TM Pham, TJ Gorenc
US Patent 9,940,291, 2018
182018
Log events for root cause error diagnosis
A Bacha
US Patent 10,579,459, 2020
162020
Seamlessly safeguarding data against ransomware attacks
AA Elkhail, N Lachtar, D Ibdah, R Aslam, H Khan, A Bacha, H Malik
IEEE Transactions on Dependable and Secure Computing 20 (1), 1-16, 2023
152023
Rnnfast: An accelerator for recurrent neural networks using domain-wall memory
MH Samavatian, A Bacha, L Zhou, R Teodorescu
ACM Journal on Emerging Technologies in Computing Systems (JETC) 16 (4), 1-27, 2020
142020
Nvcool: When non-volatile caches meet cold boot attacks
X Pan, A Bacha, S Rudolph, L Zhou, Y Zhang, R Teodorescu
2018 IEEE 36th International Conference on Computer Design (ICCD), 439-448, 2018
142018
Determine voltage supplied to a core
A Bacha
US Patent 9,342,123, 2016
132016
Ransomshield: A visualization approach to defending mobile systems against ransomware
N Lachtar, D Ibdah, H Khan, A Bacha
ACM Transactions on Privacy and Security 26 (3), 1-30, 2023
82023
Dark firmware: a systematic approach to exploring application security risks in the presence of untrusted firmware
D Ibdah, N Lachtar, AA Elkhail, A Bacha, H Malik
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
82020
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20