Invisispec: Making speculative execution invisible in the cache hierarchy M Yan, J Choi, D Skarlatos, A Morrison, C Fletcher, J Torrellas 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture …, 2018 | 324 | 2018 |
Speculative taint tracking (stt) a comprehensive protection for speculatively accessed data J Yu, M Yan, A Khyzha, A Morrison, J Torrellas, CW Fletcher Proceedings of the 52nd Annual IEEE/ACM International Symposium on …, 2019 | 196 | 2019 |
Fast concurrent queues for x86 processors A Morrison, Y Afek Proceedings of the 18th ACM SIGPLAN symposium on Principles and practice of …, 2013 | 176 | 2013 |
Limitations of highly-available eventually-consistent data stores H Attiya, F Ellen, A Morrison Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing …, 2015 | 105 | 2015 |
The CB tree: a practical concurrent self-adjusting search tree Y Afek, H Kaplan, B Korenfeld, A Morrison, RE Tarjan Distributed computing 27 (6), 393-417, 2014 | 94 | 2014 |
Specification and complexity of collaborative text editing H Attiya, S Burckhardt, A Gotsman, A Morrison, H Yang, M Zawirski Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing …, 2016 | 80 | 2016 |
True IOMMU protection from DMA attacks: When copy is faster than zero copy A Markuze, A Morrison, D Tsafrir Proceedings of the Twenty-First International Conference on Architectural …, 2016 | 72 | 2016 |
Speculative interference attacks: Breaking invisible speculation schemes M Behnia, P Sahu, R Paccagnella, J Yu, ZN Zhao, X Zou, T Unterluggauer, ... Proceedings of the 26th ACM International Conference on Architectural …, 2021 | 69 | 2021 |
Speculative data-oblivious execution: Mobilizing safe prediction for safe and efficient speculative execution J Yu, N Mantri, J Torrellas, A Morrison, CW Fletcher 2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture …, 2020 | 54 | 2020 |
Software-improved hardware lock elision Y Afek, A Levy, A Morrison Proceedings of the 2014 ACM symposium on Principles of distributed computing …, 2014 | 54 | 2014 |
Opening pandora’s box: A systematic study of new ways microarchitecture can leak private data JRS Vicarte, P Shome, N Nayak, C Trippel, A Morrison, D Kohlbrenner, ... 2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture …, 2021 | 45 | 2021 |
Common2 extended to stacks and unbounded concurrency Y Afek, E Gafni, A Morrison Proceedings of the twenty-fifth annual ACM symposium on Principles of …, 2006 | 45 | 2006 |
Cache index-aware memory allocation Y Afek, D Dice, A Morrison ACM SIGPLAN Notices 46 (11), 55-64, 2011 | 42 | 2011 |
Augury: Using data memory-dependent prefetchers to leak data at rest JRS Vicarte, M Flanders, R Paccagnella, G Garrett-Grossman, A Morrison, ... 2022 IEEE Symposium on Security and Privacy (SP), 1491-1505, 2022 | 41 | 2022 |
Utilizing the {IOMMU} scalably O Peleg, A Morrison, B Serebrin, D Tsafrir 2015 USENIX Annual Technical Conference (USENIX ATC 15), 549-562, 2015 | 39 | 2015 |
Predicate rcu: An rcu for scalable concurrent updates M Arbel, A Morrison ACM SIGPLAN Notices 50 (8), 21-30, 2015 | 38 | 2015 |
Speculation invariance (invarspec): Faster safe execution through program analysis ZN Zhao, H Ji, M Yan, J Yu, CW Fletcher, A Morrison, D Marinov, ... 2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture …, 2020 | 34 | 2020 |
An analysis of speculative type confusion vulnerabilities in the wild O Kirzner, A Morrison 30th USENIX Security Symposium (USENIX Security 21), 2399-2416, 2021 | 33 | 2021 |
Autonomous NIC offloads B Pismenny, H Eran, A Yehezkel, L Liss, A Morrison, D Tsafrir Proceedings of the 26th ACM International Conference on Architectural …, 2021 | 32 | 2021 |
Fast and scalable rendezvousing Y Afek, M Hakimi, A Morrison Distributed computing 26 (4), 243-269, 2013 | 32 | 2013 |