PoisonIvy: Safe speculation for secure memory TS Lehman, AD Hilton, BC Lee 2016 49th Annual IEEE/ACM International Symposium on Microarchitecture …, 2016 | 67 | 2016 |
Cryptographic cache lines for a trusted execution environment S Chhabra, FX McKeen, CV Rozas, S Komijani, TS Lehman US Patent 9,904,805, 2018 | 52 | 2018 |
Analyzing Twitter users' behavior before and after contact by the Russia's Internet Research Agency U Dutta, R Hanscom, JS Zhang, R Han, T Lehman, Q Lv, S Mishra Proceedings of the ACM on Human-Computer Interaction 5 (CSCW1), 1-24, 2021 | 20 | 2021 |
Maps: Understanding metadata access patterns in secure memory TS Lehman, AD Hilton, BC Lee 2018 IEEE international symposium on performance analysis of systems and …, 2018 | 19 | 2018 |
Cryptographic cache lines for a trusted execution environment S Chhabra, FX McKeen, CV Rozas, S Komijani, TS Lehman US Patent 10,325,118, 2019 | 15 | 2019 |
Do Twitter users change their behavior after exposure to misinformation? An in-depth analysis Y Wang, R Han, TS Lehman, Q Lv, S Mishra Social network analysis and mining 12 (1), 167, 2022 | 9 | 2022 |
Analyzing behavioral changes of twitter users after exposure to misinformation Y Wang, R Han, T Lehman, Q Lv, S Mishra Proceedings of the 2021 IEEE/ACM international conference on advances in …, 2021 | 7 | 2021 |
Understanding how readers determine the legitimacy of online news articles in the era of fake news S Pidikiti, JS Zhang, R Han, T Lehman, Q Lv, S Mishra 2020 IEEE/ACM International Conference on Advances in Social Networks …, 2020 | 7 | 2020 |
Acuerdo: Fast atomic broadcast over RDMA J Izraelevitz, G Wang, R Hanscom, K Silvers, TS Lehman, G Chockler, ... Proceedings of the 51st International Conference on Parallel Processing, 1-11, 2022 | 2 | 2022 |
A new foe in GPUs: Power side-channel attacks on neural network H Jeon, N Karimian, T Lehman 2021 22nd International Symposium on Quality Electronic Design (ISQED), 313-313, 2021 | 2 | 2021 |
Eliminating Micro-Architectural Side-Channel Attacks using Near Memory Processing C Nelson, J Izraelevitz, RI Bahar, TS Lehman 2022 IEEE International Symposium on Secure and Private Execution …, 2022 | 1 | 2022 |
A Midsummer Night’s Tree: Efficient and High Performance Secure SCM S Thomas, K Workneh, J McCarty, J Izraelevitz, T Lehman, RI Bahar Proceedings of the 29th ACM International Conference on Architectural …, 2024 | | 2024 |
Baobab Merkle Tree for Efficient Secure Memory S Thomas, K Workneh, AT Ishimwe, Z McKevitt, P Curlin, RI Bahar, ... IEEE Computer Architecture Letters, 2024 | | 2024 |
SpecCheck: A Tool for Systematic Identification of Vulnerable Transient Execution in gem5 Z McKevitt, A Trivedi, TS Lehman 2023 32nd International Conference on Parallel Architectures and Compilation …, 2023 | | 2023 |
Understanding How Readers Determine the Legitimacy of Online Medical News Articles in the Era of Fake News S Pidikiti, JS Zhang, R Han, TS Lehman, Q Lv, S Mishra Disease Control Through Social Network Surveillance, 55-75, 2022 | | 2022 |
Design Strategies for Efficient and Secure Memory TS Lehman Duke University, 2019 | | 2019 |
Using a Fast Subtree for Efficient Secure NVMs S Thomas, K Workneh, J McCarty, J Izraelevitz, T Lehman, RI Bahar | | |
Ahmed ElTantawy, AMD Bahar Asgari, Google/UMD Brandon Reagen, New York University Chia-Lin Yang, National Taiwan University C Hughes, C Hughes, D Kaeli, D Mahajan, DH Woo, D Li, F Yao, F Guo, ... | | |
ICCD 2021 G Byrd, D Tiwari, W Wang, S Cho, T Lehman, D Kaeli, C Tan, J Jeong, ... | | |
IISWC 2022 A Jain, A Hankin, A Zinenko, A Mazumdar, A Samajdar, A Amarnath, ... | | |