tree tops

Conference Papers

  1. Misiker Tadesse Aga, Colton Holoday, and Todd Austin
    Wrangling in the Power of Code Pointers with ProxyCFI
    To appear in Proceedings of the International Conference on Data and Applications Security and Privacy (DBSec 2019)

  2. Misiker Tadesse Aga and Todd Austin
    Smokestack: thwarting DOP attacks with runtime stack layout randomization
    in IEEE/ACM International Symposium on Code Generation and Optimization (CGO 2019)

  3. M. Gallagher, L. Biernacki, S. Chen, Z. Aweke, S. Yitbarek, M. Aga, A. Harris, Z. Xu, B. Kasikci, V. Bertacco, S. Malik, M. Tiwari, T. Austin
    Morpheus: A Vulnerability-Tolerant Secure Architecture Based on Ensembles of Moving Target Defenses with Churn
    in 24th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2019)

  4. Moritz Lipp, Misiker Tadesse Aga, Michael Schwarz, Daniel Gruss, Clémentine Maurice, Lukas Raab and Lukas Lamster
    Nethammer: Inducing rowhammer faults through network requests
    arXiv preprint arXiv:1805.04956 [Paper]

  5. Misiker Tadesse Aga, Zelalem Birhanu Aweke and Todd Austin
    When Good Protections Go Bad: Exploiting Anti-DoS Measures to Accelerate Rowhammer Attacks
    in IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2017) [Paper] [PPT]

  6. Salessawi Ferede Yitbarek, Misiker Tadesse Aga, Reetuparna Das and Todd Austin
    Cold Boot Attacks are Still Hot: Security Analysis of Memory Scramblers in Modern Processors
    in the 2017 IEEE Symposium on High Performance Computer Architecture (HPCA-2017) [Paper]

  7. Misiker Tadesse Aga and Eneyew Adugna
    High Performance Automatic Target Recognition
    In the 12th edition of IEEE AFRICON (IEEE AFRICON 2015) [Paper]