Containerleaks: Emerging security threats of information leakages in container clouds X Gao, Z Gu, M Kayaalp, D Pendarakis, H Wang 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 168 | 2017 |
A high-resolution side-channel attack on last-level cache M Kayaalp, N Abu-Ghazaleh, D Ponomarev, A Jaleel Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016 | 163 | 2016 |
Branch regulation: Low-overhead protection from code reuse attacks M Kayaalp, M Ozsoy, N Abu-Ghazaleh, D Ponomarev ACM SIGARCH Computer Architecture News 40 (3), 94-105, 2012 | 132 | 2012 |
SCRAP: Architecture for signature-based protection from code reuse attacks M Kayaalp, T Schmitt, J Nomani, D Ponomarev, N Abu-Ghazaleh 2013 IEEE 19th International Symposium on High Performance Computer …, 2013 | 86 | 2013 |
Ric: Relaxed inclusion caches for mitigating llc side-channel attacks M Kayaalp, KN Khasawneh, HA Esfeden, J Elwell, N Abu-Ghazaleh, ... Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017 | 85 | 2017 |
A collaborative and content based event recommendation system integrated with data collection scrapers and services at a social networking site M Kayaalp, T Ozyer, ST Ozyer 2009 International Conference on Advances in Social Network Analysis and …, 2009 | 61 | 2009 |
A study on the security implications of information leakages in container clouds X Gao, B Steenkamer, Z Gu, M Kayaalp, D Pendarakis, H Wang IEEE Transactions on Dependable and Secure Computing 18 (1), 174-191, 2018 | 57 | 2018 |
Efficiently securing systems from code reuse attacks M Kayaalp, M Ozsoy, NA Ghazaleh, D Ponomarev IEEE Transactions on Computers 63 (5), 1144-1156, 2012 | 40 | 2012 |
Data processing and communication strategies for lifetime optimization in wireless sensor networks B Tavli, M Kayaalp, O Ceylan, IE Bagci AEU-International Journal of Electronics and Communications 64 (10), 992-998, 2010 | 32 | 2010 |
A mash-up application utilizing hybridized filtering techniques for recommending events at a social networking site M Kayaalp, T Özyer, ST Özyer Social Network Analysis and Mining, 1-9, 2010 | 21 | 2010 |
Signature-based protection from code reuse attacks M Kayaalp, T Schmitt, J Nomani, D Ponomarev, NA Ghazaleh IEEE Transactions on Computers 64 (2), 533-546, 2013 | 17 | 2013 |
File Signatures Needed! S Berger, M Kayaalp, D Pendarakis, M Zohar Linux Plumbers Conference, 2016 | 5 | 2016 |
Kernel-based power consumption and isolation and defense against emerging power attacks X Gao, Z Gu, M Kayaalp, D Pendarakis US Patent 11,669,426, 2023 | 4 | 2023 |
Improving the soft error resilience of the register files using SRAM bitcells with built-in comparators M Kayaalp, F Koc, O Ergin 2012 15th Euromicro Conference on Digital System Design, 140-143, 2012 | 4 | 2012 |
Data processing and communication strategies for lifetime optimization in wireless sensor networks M Kayaalp, O Ceylan, IE Bagci, B Tavli 2009 IEEE 17th Signal Processing and Communications Applications Conference …, 2009 | 3 | 2009 |
Using logisim-evolution for teaching datapath and control M Kayaalp 2021 ACM/IEEE Workshop on Computer Architecture Education (WCAE), 1-8, 2021 | 2 | 2021 |
Hardware Support For Malware Defense and End-To-End Trust R Boivie, E Ekanadham, B Jain, E Hall, GDH Hunt, M Kapur, M Kayaalp, ... Technical Report. IBM TJ Watson Research Center, 2017 | 2 | 2017 |
Dynamic register file partitioning in superscalar microprocessors for energy efficiency M Özsoy, YO Koçberber, M Kayaalp, O Ergin Computer Design (ICCD), 2010 IEEE International Conference on, 515-520, 2010 | 2 | 2010 |
Exploiting bus level and bit level inactivity for preventing wire degradation due to electromigration M Kayaalp, F Koc, O Ergin 2012 15th Euromicro Conference on Digital System Design, 280-287, 2012 | 1 | 2012 |
Architectural techniques for protecting systems against emerging attacks M Kayaalp State University of New York at Binghamton, 2015 | | 2015 |