Suivre
Salessawi Ferede Yitbarek
Salessawi Ferede Yitbarek
Adresse e-mail validée de intel.com
Titre
Citée par
Citée par
Année
ANVIL: Software-based protection against next-generation rowhammer attacks
ZB Aweke, SF Yitbarek, R Qiao, R Das, M Hicks, Y Oren, T Austin
Proceedings of the Twenty-First International Conference on Architectural …, 2016
2232016
Morpheus: A vulnerability-tolerant secure architecture based on ensembles of moving target defenses with churn
M Gallagher, L Biernacki, S Chen, ZB Aweke, SF Yitbarek, MT Aga, ...
Proceedings of the Twenty-Fourth International Conference on Architectural …, 2019
782019
Cold Boot Attacks are Still Hot: Security Analysis of Memory Scramblers in Modern Processors
SF Yitbarek, MT Aga, R Das, T Austin
IEEE, 2017
762017
Exploring specialized near-memory processing for data intensive operations
SF Yitbarek, T Yang, R Das, T Austin
2016 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2016
452016
Reducing the overhead of authenticated memory encryption using delta encoding and ECC memory
SF Yitbarek, T Austin
Proceedings of the 55th Annual Design Automation Conference, 1-6, 2018
132018
Protection of privacy and data on smart edge devices
LA Booth Jr, SF Yitbarek, R Lal, PM Pappachan, BD Thomas
US Patent 11,423,171, 2022
102022
SNIFFER: A high-accuracy malware detector for enterprise-based systems
E Chavis, H Davis, Y Hou, M Hicks, SF Yitbarek, T Austin, V Bertacco
2017 IEEE 2nd International Verification and Security Workshop (IVSW), 70-75, 2017
52017
Reetuparna Das, Matthew Hicks, Yossi Oren, and Todd M. Austin. ANVIL: software-based protection against next-generation rowhammer attacks
ZB Aweke, SF Yitbarek, R Qiao
Proceedings of the Twenty-First International Conference on Architectural …, 0
5
Trusted execution aware hardware debug and manageability
SF Yitbarek, L Kida, V Scarlata, R Lal, S Johnson
US Patent App. 16/723,599, 2020
42020
Reetuparna Das et Todd Austin (fév. 2017).«Cold Boot Attacks are Still Hot: Security Analysis of Memory Scramblers in Modern Processors»
SF Yitbarek, MT Aga
2017 IEEE International Symposium on High Performance Computer Architecture …, 0
4
Reetuparna Das, Matthew Hicks, Yossi Oren, and Todd Austin
ZB Aweke, SF Yitbarek, R Qiao
ANVIL: Softwarebased protection against next-generation rowhammer attacks …, 2016
32016
Neverland: Lightweight Hardware Extensions for Enforcing Operating System Integrity
SF Yitbarek, T Austin
arXiv preprint arXiv:1905.05975, 2019
22019
Improving ECE education in Sub-Saharan African countries using the mobile studio technology and pedagogy
Y Astatke, C Scott, J Ladeji-Osias
Proceedings of the 2013 American Society of Engineering Education (ASEE …, 2013
22013
Certifying a trusted platform module without privacy certification authority infrastructure
V Scarlata, B Xing, R Lal, SF Yitbarek, S Cen
US Patent App. 16/722,234, 2020
12020
Protection of communications between trusted execution environment and hardware accelerator utilizing enhanced end-to-end encryption and inter-context security
SF Yitbarek, LA Booth Jr, BD Thomas, R Lal, PM Pappachan, A Kadam
US Patent App. 18/496,108, 2024
2024
Protection of communications between trusted execution environment and hardware accelerator utilizing enhanced end-to-end encryption and inter-context security
SF Yitbarek, LA Booth Jr, BD Thomas, R Lal, PM Pappachan, A Kadam
US Patent 11,836,262, 2023
2023
Protection of privacy and data on smart edge devices
LA Booth Jr, SF Yitbarek, R Lal, PM Pappachan, BD Thomas
US Patent 11,836,272, 2023
2023
Secure accelerator device pairing for trusted accelerator-to-accelerator communication
SF Yitbarek, PM Pappachan, V Scarlata, R Lal
US Patent 11,575,672, 2023
2023
Protection of communications between trusted execution environment and hardware accelerator utilizing enhanced end-to-end encryption and inter-context security
SF Yitbarek, LA Booth Jr, BD Thomas, R Lal, PM Pappachan, A Kadam
US Patent 11,461,483, 2022
2022
Hardware Mechanisms for Efficient Memory System Security
SF Yitbarek
2018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20