Obserwuj
Mehmet Kayaalp
Mehmet Kayaalp
Electrical and Computer Engineering, University of New Hampshire
Zweryfikowany adres z unh.edu - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Branch regulation: Low-overhead protection from code reuse attacks
M Kayaalp, M Ozsoy, N Abu-Ghazaleh, D Ponomarev
ACM SIGARCH Computer Architecture News 40 (3), 94-105, 2012
1262012
A high-resolution side-channel attack on last-level cache
M Kayaalp, N Abu-Ghazaleh, D Ponomarev, A Jaleel
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
1192016
Containerleaks: Emerging security threats of information leakages in container clouds
X Gao, Z Gu, M Kayaalp, D Pendarakis, H Wang
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
1102017
SCRAP: Architecture for signature-based protection from code reuse attacks
M Kayaalp, T Schmitt, J Nomani, D Ponomarev, N Abu-Ghazaleh
2013 IEEE 19th International Symposium on High Performance Computer …, 2013
812013
Ric: Relaxed inclusion caches for mitigating llc side-channel attacks
M Kayaalp, KN Khasawneh, HA Esfeden, J Elwell, N Abu-Ghazaleh, ...
2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2017
682017
A collaborative and content based event recommendation system integrated with data collection scrapers and services at a social networking site
M Kayaalp, T Ozyer, ST Ozyer
2009 International Conference on Advances in Social Network Analysis and …, 2009
572009
Efficiently securing systems from code reuse attacks
M Kayaalp, M Ozsoy, NA Ghazaleh, D Ponomarev
IEEE Transactions on Computers 63 (5), 1144-1156, 2012
322012
Data processing and communication strategies for lifetime optimization in wireless sensor networks
B Tavli, M Kayaalp, O Ceylan, IE Bagci
AEU-International Journal of Electronics and Communications 64 (10), 992-998, 2010
302010
A study on the security implications of information leakages in container clouds
X Gao, B Steenkamer, Z Gu, M Kayaalp, D Pendarakis, H Wang
IEEE Transactions on Dependable and Secure Computing 18 (1), 174-191, 2018
222018
A mash-up application utilizing hybridized filtering techniques for recommending events at a social networking site
M Kayaalp, T Özyer, ST Özyer
Social Network Analysis and Mining, 1-9, 2010
212010
Signature-based protection from code reuse attacks
M Kayaalp, T Schmitt, J Nomani, D Ponomarev, NA Ghazaleh
IEEE Transactions on Computers 64 (2), 533-546, 2013
132013
File Signatures Needed!
S Berger, M Kayaalp, D Pendarakis, M Zohar
Linux Plumbers Conference, 2016
52016
Kernel-based power consumption and isolation and defense against emerging power attacks
X Gao, Z Gu, M Kayaalp, D Pendarakis
US Patent App. 15/638,694, 2019
32019
Improving the soft error resilience of the register files using sram bitcells with built-in comparators
M Kayaalp, F Koc, O Ergin
2012 15th Euromicro Conference on Digital System Design, 140-143, 2012
32012
Data processing and communication strategies for lifetime optimization in wireless sensor networks
M Kayaalp, O Ceylan, IE Bagci, B Tavli
2009 IEEE 17th Signal Processing and Communications Applications Conference …, 2009
32009
Hardware Support for Malware Defense and End-to-End Trust
R Boivie, E Ekanadham, B Jain, E Hall, G Hunt, M Kapur, M Kayaalp, ...
International Business Machines Corporation TJ Watson Research Center …, 2017
22017
Dynamic register file partitioning in superscalar microprocessors for energy efficiency
M Özsoy, YO Koçberber, M Kayaalp, O Ergin
Computer Design (ICCD), 2010 IEEE International Conference on, 515-520, 2010
22010
Exploiting bus level and bit level inactivity for preventing wire degradation due to electromigration
M Kayaalp, F Koc, O Ergin
2012 15th Euromicro Conference on Digital System Design, 280-287, 2012
12012
Using Logisim-evolution for Teaching Datapath and Control
M Kayaalp
2021 ACM/IEEE Workshop on Computer Architecture Education (WCAE), 1-8, 2021
2021
Architectural techniques for protecting systems against emerging attacks
M Kayaalp
State University of New York at Binghamton, 2015
2015
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20