TPM-SIM: A framework for performance evaluation of Trusted Platform Modules

Ponomarev , Schmitz , Loew , Elwell
design automation conference 236 -241

2011
Mathematical limits of parallel computation for embedded systems

Dmitry Ponomarev , Jason Loew , Patrick H. Madden , Jesse Elwell
asia and south pacific design automation conference 653 -660

2011
Hardening extended memory access control schemes with self-verified address spaces

Dmitry Evtyushkin , Dmitry Ponomarev , Nael Abu-Ghazaleh , Jesse Elwell
international conference on computer aided design 392 -399

2
2017
Computing with time: microarchitectural weird machines

Dmitry Evtyushkin , Jesse Elwell , Abhrajit Ghosh , Angelo Sapello
architectural support for programming languages and operating systems 758 -772

2021
RIC: Relaxed Inclusion Caches for Mitigating LLC Side-Channel Attacks

Mehmet Kayaalp , Khaled N. Khasawneh , Hodjat Asghari Esfeden , Jesse Elwell
design automation conference 7

43
2017
On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters

Baljit Singh , Dmitry Evtyushkin , Jesse Elwell , Ryan Riley
computer and communications security 483 -493

42
2017
Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications

Dmitry Evtyushkin , Jesse Elwell , Meltem Ozsoy , Dmitry Ponomarev
IEEE Transactions on Dependable and Secure Computing 15 ( 3) 437 -451

9
2016
A co-processor approach for accelerating data-structure intensive algorithms

Jason Loew , Jesse Elwell , Dmitry Ponomarev , Patrick H. Madden
international conference on computer design 431 -438

5
2010
A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks

Jesse Elwell , Ryan Riley , Nael Abu-Ghazaleh , Dmitry Ponomarev
high-performance computer architecture 201 -212

9
2014
Rethinking Memory Permissions for Protection Against Cross-Layer Attacks

Jesse Elwell , Ryan Riley , Nael Abu-Ghazaleh , Dmitry Ponomarev
ACM Transactions on Architecture and Code Optimization 12 ( 4) 56

3
2015
Iso-X: A Flexible Architecture for Hardware-Managed Isolated Execution

Dmitry Evtyushkin , Jesse Elwell , Meltem Ozsoy , Dmitry Ponomarev
international symposium on microarchitecture 190 -202

56
2014
Investigating the Synergy between Routing and Forwarding Strategy in NDN Networks

Lan Wang , Alexander Lane , Constantin Serban , Jesse Elwell
67 -77

2023
Secure NDN Packet Encapsulation

Daniel Townley , Young Kim , Fred Douglis , Jesse Elwell
ICC 2023-IEEE International Conference on Communications 1106 -1111

2023
Runtime Attestation for IAAS Clouds.

Jesse Elwell , Angelo Sapello , Alexander Poylisher , Giovanni Di Crescenzo
CLOSER 233 -247

2018
ROP Defense in the Cloud through LIve Text Page-level Re-ordering

Angelo Sapello , C Jason Chiang , Jesse Elwell , Abhrajit Ghosh
219 -228

2017
Generalized Insider Attack Detection Implementation using NetFlow Data

Yash Samtani , Jesse Elwell
arXiv preprint arXiv:2010.15697

2020
Securing systems with non-inclusive memory permissions

Jesse Elwell
State University of New York at Binghamton

2016