Conference Papers
-
Misiker Tadesse Aga, Colton Holoday, and Todd Austin
Wrangling in the Power of Code Pointers with ProxyCFI
To appear in Proceedings of the International Conference on Data and Applications Security and Privacy (DBSec 2019) -
Misiker Tadesse Aga and Todd Austin
Smokestack: thwarting DOP attacks with runtime stack layout randomization
in IEEE/ACM International Symposium on Code Generation and Optimization (CGO 2019) -
M. Gallagher, L. Biernacki, S. Chen, Z. Aweke, S. Yitbarek, M. Aga, A. Harris, Z. Xu, B. Kasikci, V. Bertacco, S. Malik, M. Tiwari, T. Austin
Morpheus: A Vulnerability-Tolerant Secure Architecture Based on Ensembles of Moving Target Defenses with Churn
in 24th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2019) -
Moritz Lipp, Misiker Tadesse Aga, Michael Schwarz, Daniel Gruss, Clémentine Maurice, Lukas Raab and Lukas Lamster
Nethammer: Inducing rowhammer faults through network requests
arXiv preprint arXiv:1805.04956 [Paper] -
Misiker Tadesse Aga, Zelalem Birhanu Aweke and Todd Austin
When Good Protections Go Bad: Exploiting Anti-DoS Measures to Accelerate Rowhammer Attacks
in IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2017) [Paper] [PPT] -
Salessawi Ferede Yitbarek, Misiker Tadesse Aga, Reetuparna Das and Todd Austin
Cold Boot Attacks are Still Hot: Security Analysis of Memory Scramblers in Modern Processors
in the 2017 IEEE Symposium on High Performance Computer Architecture (HPCA-2017) [Paper] -
Misiker Tadesse Aga and Eneyew Adugna
High Performance Automatic Target Recognition
In the 12th edition of IEEE AFRICON (IEEE AFRICON 2015) [Paper]
