Deepsteal: Advanced model extractions leveraging efficient weight stealing in memories MHI Chowdhuryy, AS Rakin, F Yao, D Fan 2022 IEEE Symposium on Security and Privacy (SP), 1157-1174, 2022 | 72 | 2022 |
BranchSpec: Information Leakage Attacks Exploiting Speculative Branch Instruction Executions MHI Chowdhuryy, H Liu, F Yao 2020 IEEE 38th International Conference on Computer Design (ICCD), 529-536, 2020 | 29 | 2020 |
AI Assisted Portable ECG for Fast and Patient Specific Diagnosis MHI Chowdhuryy, M Sultana, R Ghosh, JU Ahamed, MAI Mahmood 2018 International Conference on Computer, Communication, Chemical, Material …, 2018 | 19 | 2018 |
Leaking secrets through modern branch predictors in the speculative world MHI Chowdhuryy, F Yao IEEE Transactions on Computers 71 (9), 2059-2072, 2021 | 15 | 2021 |
Seeds of SEED: NMT-Stroke: Diverting Neural Machine Translation through Hardware-based Faults K Cai, MHI Chowdhuryy, Z Zhang, F Yao 2021 International Symposium on Secure and Private Execution Environment …, 2021 | 8 | 2021 |
R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change Memories MHI Chowdhuryy, R Ewetz, A Awad, F Yao IEEE International Symposium on Secure and Private Execution Environment …, 2021 | 7* | 2021 |
LADDER: Architecting Content and Location-aware Writes for Crossbar Resistive Memories MHI Chowdhuryy, MRH Rashed, A Awad, R Ewetz, F Yao MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture …, 2021 | 6 | 2021 |
Understanding and Characterizing Side Channels Exploiting Phase Change Memories MHI Chowdhuryy, R Ewetz, A Awad, F Yao IEEE Micro, 2023 | | 2023 |
BeKnight: Guarding against Information Leakage in Speculatively Updated Branch Predictors MHI Chowdhuryy, Z Zhang, F Yao IEEE/ACM International Conference on Computer-Aided Design, 2023 | | 2023 |
D-Shield: Enabling Processor-side Encryption and Integrity Verification for Secure NVMe Drives MHI Chowdhuryy, M Jung, F Yao, A Awad The 29th IEEE International Symposium on High-Performance Computer …, 2023 | | 2023 |
TR: Leakage of Sensitive Information through Speculative Branch Executions F Yao, MHI Chowdhuryy | | |