Holistic {Control-Flow} protection on {Real-Time} embedded systems with kage Y Du, Z Shen, K Dharsee, J Zhou, RJ Walls, J Criswell 31st USENIX Security Symposium (USENIX Security 22), 2281-2298, 2022 | 30 | 2022 |
Fast execute-only memory for embedded systems Z Shen, K Dharsee, J Criswell 2020 IEEE Secure Development (SecDev), 7-14, 2020 | 19 | 2020 |
A software solution for hardware vulnerabilities K Dharsee, E Johnson, J Criswell 2017 IEEE Cybersecurity Development (SecDev), 27-33, 2017 | 9 | 2017 |
Randezvous: Making Randomization Effective on MCUs Z Shen, K Dharsee, J Criswell Proceedings of the 38th Annual Computer Security Applications Conference, 28-41, 2022 | 7 | 2022 |
Jinn: Hijacking safe programs with trojans K Dharsee, J Criswell 32nd USENIX Security Symposium (USENIX Security 23), 6965-6982, 2023 | 5 | 2023 |
Hardware vulnerability and mitigation survey K Dharsee, E Johnson, J Criswell | 4 | 2017 |
Secure guest virtual machine support in apparition E Johnson, K Dharsee, J Criswell Proceedings of the 15th ACM SIGPLAN/SIGOPS International Conference on …, 2019 | 1 | 2019 |
Critical Hardware Towards Software Security Enforcement K Dharsee University of Rochester, 2023 | | 2023 |
Hardware Vulnerability and Mitigation Survey Technical Report# 1000 K Dharsee, E Johnson, J Criswell | | |