Segui
Md Hafizul Islam Chowdhuryy
Md Hafizul Islam Chowdhuryy
Email verificata su ucf.edu - Home page
Titolo
Citata da
Citata da
Anno
Deepsteal: Advanced model extractions leveraging efficient weight stealing in memories
MHI Chowdhuryy, AS Rakin, F Yao, D Fan
2022 IEEE Symposium on Security and Privacy (SP), 1157-1174, 2022
1202022
BranchSpec: Information Leakage Attacks Exploiting Speculative Branch Instruction Executions
MHI Chowdhuryy, H Liu, F Yao
2020 IEEE 38th International Conference on Computer Design (ICCD), 529-536, 2020
402020
Leaking secrets through modern branch predictors in the speculative world
MHI Chowdhuryy, F Yao
IEEE Transactions on Computers 71 (9), 2059-2072, 2021
242021
AI Assisted Portable ECG for Fast and Patient Specific Diagnosis
MHI Chowdhuryy, M Sultana, R Ghosh, JU Ahamed, MAI Mahmood
2018 International Conference on Computer, Communication, Chemical, Material …, 2018
212018
Seeds of SEED: NMT-Stroke: Diverting Neural Machine Translation through Hardware-based Faults
K Cai, MHI Chowdhuryy, Z Zhang, F Yao
2021 International Symposium on Secure and Private Execution Environment …, 2021
142021
R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change Memories
MHI Chowdhuryy, R Ewetz, A Awad, F Yao
IEEE International Symposium on Secure and Private Execution Environment …, 2021
10*2021
LADDER: Architecting Content and Location-aware Writes for Crossbar Resistive Memories
MHI Chowdhuryy, MRH Rashed, A Awad, R Ewetz, F Yao
MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture …, 2021
72021
DeepVenom: Persistent DNN Backdoors Exploiting Transient Weight Perturbations in Memories
K Cai, MHI Chowdhuryy, Z Zhang, F Yao
2024 IEEE Symposium on Security and Privacy (SP), 244-244, 2024
52024
PowSpectre: Powering Up Speculation Attacks with TSX-based Replay
MHI Chowdhuryy, Z Zhang, F Yao
Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024
32024
Understanding and Characterizing Side Channels Exploiting Phase-Change Memories
MHI Chowdhuryy, R Ewetz, A Awad, F Yao
IEEE Micro 43 (5), 8-15, 2023
32023
BeKnight: Guarding against Information Leakage in Speculatively Updated Branch Predictors
MHI Chowdhuryy, Z Zhang, F Yao
IEEE/ACM International Conference on Computer-Aided Design, 2023
32023
D-Shield: Enabling Processor-side Encryption and Integrity Verification for Secure NVMe Drives
MHI Chowdhuryy, M Jung, F Yao, A Awad
The 29th IEEE International Symposium on High-Performance Computer …, 2023
32023
IvLeague: Side Channel-resistant Secure Architectures Using Isolated Domains of Dynamic Integrity Trees
MHI Chowdhuryy, F Yao
IEEE/ACM International Symposium on Microarchitecture (MICRO), 2024
2024
MetaLeak: Uncovering Side Channels in Secure Processor Architectures Exploiting Metadata
MHI Chowdhuryy, H Zheng, F Yao
2024 ACM/IEEE 51st Annual International Symposium on Computer Architecture …, 2024
2024
TR: Leakage of Sensitive Information through Speculative Branch Executions
F Yao, MHI Chowdhuryy
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–15