Mohit Tiwari
Mohit Tiwari
Assistant Professor, UT Austin
Verifierad e-postadress på austin.utexas.edu - Startsida
TitelCiteras avÅr
Complete information flow tracking from the gates up
M Tiwari, HMG Wassel, B Mazloom, S Mysore, FT Chong, T Sherwood
ACM Sigplan Notices 44 (3), 109-120, 2009
1972009
Phantom: Practical oblivious computation in a secure processor
M Maas, E Love, E Stefanov, M Tiwari, E Shi, K Asanovic, J Kubiatowicz, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1922013
Raccoon: Closing digital side-channels through obfuscated execution
A Rane, C Lin, M Tiwari
24th {USENIX} Security Symposium ({USENIX} Security 15), 431-446, 2015
1162015
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
M Tiwari, JK Oberg, X Li, J Valamehr, T Levin, B Hardekopf, R Kastner, ...
ACM SIGARCH Computer Architecture News 39 (3), 189-200, 2011
1102011
Ghostrider: A hardware-software system for memory trace oblivious computation
C Liu, A Harris, M Maas, M Hicks, M Tiwari, E Shi
ACM SIGPLAN Notices 50 (4), 87-101, 2015
1092015
Caisson: a hardware description language for secure information flow
X Li, M Tiwari, JK Oberg, V Kashyap, FT Chong, T Sherwood, ...
ACM Sigplan Notices 46 (6), 109-120, 2011
832011
Sapper: A language for hardware-level security policy enforcement
X Li, V Kashyap, JK Oberg, M Tiwari, VR Rajarathinam, R Kastner, ...
ACM SIGPLAN Notices 49 (4), 97-112, 2014
772014
Execution leases: A hardware-supported mechanism for enforcing strong non-interference
M Tiwari, X Li, HMG Wassel, FT Chong, T Sherwood
Proceedings of the 42nd Annual IEEE/ACM International Symposium on …, 2009
692009
Madmac: Building a reconfiguration radio testbed using commodity 802.11 hardware
A Sharma, M Tiwari, H Zheng
2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio …, 2006
682006
Information flow isolation in I2C and USB
J Oberg, W Hu, A Irturk, M Tiwari, T Sherwood, R Kastner
2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC), 254-259, 2011
552011
Fighting fire with fire: modeling the datacenter-scale effects of targeted superlattice thermal management
S Biswas, M Tiwari, T Sherwood, L Theogarajan, FT Chong
ACM SIGARCH Computer Architecture News 39 (3), 331-340, 2011
482011
Understanding contention-based channels and using them for defense
C Hunger, M Kazdagli, A Rawat, A Dimakis, S Vishwanath, M Tiwari
2015 IEEE 21st International Symposium on High Performance Computer …, 2015
462015
Opportunities and challenges of using plasmonic components in nanophotonic architectures
HMG Wassel, D Dai, M Tiwari, JK Valamehr, L Theogarajan, J Dionne, ...
IEEE Journal on Emerging and Selected Topics in Circuits and Systems 2 (2 …, 2012
392012
Theoretical fundamentals of gate level information flow tracking
W Hu, J Oberg, A Irturk, M Tiwari, T Sherwood, D Mu, R Kastner
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2011
382011
A small cache of large ranges: Hardware methods for efficiently searching, storing, and updating big dataflow tags
M Tiwari, B Agrawal, S Mysore, J Valamehr, T Sherwood
Proceedings of the 41st annual IEEE/ACM International Symposium on …, 2008
382008
Avoiding information leakage in the memory controller with fixed service policies
A Shafiee, A Gundu, M Shevgoor, R Balasubramonian, M Tiwari
Proceedings of the 48th International Symposium on Microarchitecture, 89-101, 2015
302015
Theoretical analysis of gate level information flow tracking
J Oberg, W Hu, A Irturk, M Tiwari, T Sherwood, R Kastner
Proceedings of the 47th Design Automation Conference, 244-247, 2010
302010
Hardware assistance for trustworthy systems through 3-D integration
J Valamehr, M Tiwari, T Sherwood, R Kastner, T Huffmire, C Irvine, ...
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
242010
Secure, precise, and fast floating-point operations on x86 processors
A Rane, C Lin, M Tiwari
25th {USENIX} Security Symposium ({USENIX} Security 16), 71-86, 2016
222016
On the complexity of generating gate level information flow tracking logic
W Hu, J Oberg, A Irturk, M Tiwari, T Sherwood, D Mu, R Kastner
IEEE Transactions on Information Forensics and Security 7 (3), 1067-1080, 2012
202012
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20