default search action
Christopher W. Fletcher
Person information
- affiliation: University of Illinois Urbana-Champaign, IL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c79]Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas:
Everywhere All at Once: Co-Location Attacks on Public Cloud FaaS. ASPLOS (1) 2024: 133-149 - [c78]Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas:
Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud. ASPLOS (2) 2024: 582-600 - [c77]Nandeeka Nayak, Toluwanimi O. Odemuyiwa, Shubham Ugare, Christopher W. Fletcher, Michael Pellauer, Joel S. Emer:
TeAAL: A Declarative Framework for Modeling Sparse Tensor Accelerators (Abstract). HOPC@SPAA 2024 - [c76]Yao Hsiao, Nikos Nikoleris, Artem Khyzha, Dominic P. Mulligan, Gustavo Petri, Christopher W. Fletcher, Caroline Trippel:
RTL2MμPATH: Multi-μPATH Synthesis with Applications to Hardware Security Verification. MICRO 2024: 507-524 - [c75]Nandeeka Nayak, Xinrui Wu, Toluwanimi O. Odemuyiwa, Michael Pellauer, Joel S. Emer, Christopher W. Fletcher:
FuseMax: Leveraging Extended Einsums to Optimize Attention Accelerator Design. MICRO 2024: 1458-1473 - [c74]Yingchen Wang, Riccardo Paccagnella, Zhao Gang, Willy R. Vasquez, David Kohlbrenner, Hovav Shacham, Christopher W. Fletcher:
GPU.zip: On the Side-Channel Implications of Hardware-Based Graphical Data Compression. SP 2024: 3716-3734 - [c73]Sushant Dinesh, Madhusudan Parthasarathy, Christopher W. Fletcher:
ConjunCT: Learning Inductive Invariants to Prove Unbounded Instruction Safety Against Microarchitectural Timing Attacks. SP 2024: 3735-3753 - [c72]Boru Chen, Yingchen Wang, Pradyumna Shome, Christopher W. Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin:
GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers. USENIX Security Symposium 2024 - [i28]Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas:
Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud (Extended Version). CoRR abs/2405.12469 (2024) - [i27]Nandeeka Nayak, Xinrui Wu, Toluwanimi O. Odemuyiwa, Michael Pellauer, Joel S. Emer, Christopher W. Fletcher:
FuseMax: Leveraging Extended Einsums to Optimize Attention Accelerator Design. CoRR abs/2406.10491 (2024) - [i26]Yao Hsiao, Nikos Nikoleris, Artem Khyzha, Dominic P. Mulligan, Gustavo Petri, Christopher W. Fletcher, Caroline Trippel:
RTL2MμPATH: Multi-μPATH Synthesis with Applications to Hardware Security Verification. CoRR abs/2409.19478 (2024) - [i25]Kris Shengjun Dong, Dima Nikiforov, Widyadewi Soedarmadji, Minh Nguyen, Christopher W. Fletcher, Yakun Sophia Shao:
Design Space Exploration of Embedded SoC Architectures for Real-Time Optimal Control. CoRR abs/2410.12142 (2024) - 2023
- [j11]Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, David Kohlbrenner:
Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. IEEE Micro 43(4): 19-27 (2023) - [c71]Toluwanimi O. Odemuyiwa, Hadi Asghari Moghaddam, Michael Pellauer, Kartik Hegde, Po-An Tsai, Neal Clayton Crago, Aamer Jaleel, John D. Owens, Edgar Solomonik, Joel S. Emer, Christopher W. Fletcher:
Accelerating Sparse Data Orchestration via Dynamic Reflexive Tiling. ASPLOS (3) 2023: 18-32 - [c70]Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas:
Untangle: A Principled Framework to Design Low-Leakage, High-Performance Dynamic Partitioning Schemes. ASPLOS (3) 2023: 771-788 - [c69]Rutvik Choudhary, Alan Wang, Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher:
Declassiflow: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures. CCS 2023: 2053-2067 - [c68]Toluwanimi O. Odemuyiwa, Hadi Asghari Moghaddam, Michael Pellauer, Kartik Hegde, Po-An Tsai, Neal Clayton Crago, Aamer Jaleel, John D. Owens, Edgar Solomonik, Joel S. Emer, Christopher W. Fletcher:
Accelerating Sparse Data Orchestration via Dynamic Reflexive Tiling (Extended Abstract). HOPC@SPAA 2023: 15-16 - [c67]Tobias Jauch, Alex Wezel, Mohammad Rahmani Fadiheh, Philipp Schmitz, Sayak Ray, Jason M. Fung, Christopher W. Fletcher, Dominik Stoffel, Wolfgang Kunz:
Secure-by-Construction Design Methodology for CPUs: Implementing Secure Speculation on the RTL. ICCAD 2023: 1-9 - [c66]Jiyong Yu, Trent Jaeger, Christopher Wardlaw Fletcher:
All Your PC Are Belong to Us: Exploiting Non-control-Transfer Instruction BTB Updates for Dynamic PC Extraction. ISCA 2023: 65:1-65:14 - [c65]Nandeeka Nayak, Toluwanimi O. Odemuyiwa, Shubham Ugare, Christopher W. Fletcher, Michael Pellauer, Joel S. Emer:
TeAAL: A Declarative Framework for Modeling Sparse Tensor Accelerators. MICRO 2023: 1255-1270 - [c64]Yingchen Wang, Riccardo Paccagnella, Alan Wandke, Zhao Gang, Grant Garrett-Grossman, Christopher W. Fletcher, David Kohlbrenner, Hovav Shacham:
DVFS Frequently Leaks Secrets: Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data. SP 2023: 2306-2320 - [c63]Jiyong Yu, Aishani Dutta, Trent Jaeger, David Kohlbrenner, Christopher W. Fletcher:
Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions. USENIX Security Symposium 2023: 1973-1990 - [i24]Nandeeka Nayak, Toluwanimi O. Odemuyiwa, Shubham Ugare, Christopher W. Fletcher, Michael Pellauer, Joel S. Emer:
TeAAL: A Declarative Framework for Modeling Sparse Tensor Accelerators. CoRR abs/2304.07931 (2023) - [i23]Rutvik Choudhary, Alan Wang, Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher:
DECLASSIFLOW: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures (Full Version). CoRR abs/2312.09336 (2023) - [i22]Christopher W. Fletcher, Marco Guarnieri, David Kohlbrenner, Clémentine Maurice:
MAD: Microarchitectural Attacks and Defenses (Dagstuhl Seminar 23481). Dagstuhl Reports 13(11): 151-166 (2023) - 2022
- [c62]Zhangxiaowen Gong, Houxiang Ji, Yao Yao, Christopher W. Fletcher, Christopher J. Hughes, Josep Torrellas:
Graphite: optimizing graph neural networks on CPUs through cooperative software-hardware techniques. ISCA 2022: 916-931 - [c61]Sushant Dinesh, Grant Garrett-Grossman, Christopher W. Fletcher:
SynthCT: Towards Portable Constant-Time Code. NDSS 2022 - [c60]Jiyong Yu, Xinyang Ge, Trent Jaeger, Christopher W. Fletcher, Weidong Cui:
Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory. SEED 2022: 133-144 - [c59]Jose Rodrigo Sanchez Vicarte, Michael Flanders, Riccardo Paccagnella, Grant Garrett-Grossman, Adam Morrison, Christopher W. Fletcher, David Kohlbrenner:
Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest. SP 2022: 1491-1505 - [c58]Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, David Kohlbrenner:
Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. USENIX Security Symposium 2022: 679-697 - [c57]Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas:
Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker. USENIX Security Symposium 2022: 699-716 - 2021
- [j10]Jiyong Yu, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas, Christopher W. Fletcher:
Speculative taint tracking (STT): a comprehensive protection for speculatively accessed data. Commun. ACM 64(12): 105-112 (2021) - [j9]Po-An Tsai, Andrés Sánchez, Christopher W. Fletcher, Daniel Sánchez:
Leaking Secrets Through Compressed Caches. IEEE Micro 41(3): 27-33 (2021) - [c56]Kartik Hegde, Po-An Tsai, Sitao Huang, Vikas Chandra, Angshuman Parashar, Christopher W. Fletcher:
Mind mappings: enabling efficient algorithm-accelerator mapping space search. ASPLOS 2021: 943-958 - [c55]Mohammad Behnia, Prateek Sahu, Riccardo Paccagnella, Jiyong Yu, Zirui Neil Zhao, Xiang Zou, Thomas Unterluggauer, Josep Torrellas, Carlos V. Rozas, Adam Morrison, Frank McKeen, Fangfei Liu, Ron Gabor, Christopher W. Fletcher, Abhishek Basak, Alaa R. Alameldeen:
Speculative interference attacks: breaking invisible speculation schemes. ASPLOS 2021: 1046-1060 - [c54]Dimitrios Skarlatos, Zirui Neil Zhao, Riccardo Paccagnella, Christopher W. Fletcher, Josep Torrellas:
Jamais vu: thwarting microarchitectural replay attacks. ASPLOS 2021: 1061-1076 - [c53]Gururaj Saileshwar, Christopher W. Fletcher, Moinuddin K. Qureshi:
Streamline: a fast, flushless cache covert-channel attack by enabling asynchronous collusion. ASPLOS 2021: 1077-1090 - [c52]Rohan Baskar Prabhakar, Sachit Kuhar, Rohit Agrawal, Christopher J. Hughes, Christopher W. Fletcher:
SumMerge: an efficient algorithm and implementation for weight repetition-aware DNN inference. ICS 2021: 279-290 - [c51]Jose Rodrigo Sanchez Vicarte, Pradyumna Shome, Nandeeka Nayak, Caroline Trippel, Adam Morrison, David Kohlbrenner, Christopher W. Fletcher:
Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture Can Leak Private Data. ISCA 2021: 347-360 - [c50]Abdulrahman Mahmoud, Siva Kumar Sastry Hari, Christopher W. Fletcher, Sarita V. Adve, Charbel Sakr, Naresh R. Shanbhag, Pavlo Molchanov, Michael B. Sullivan, Timothy Tsai, Stephen W. Keckler:
Optimizing Selective Protection for CNN Resilience. ISSRE 2021: 127-138 - [c49]Rutvik Choudhary, Jiyong Yu, Christopher W. Fletcher, Adam Morrison:
Speculative Privacy Tracking (SPT): Leaking Information From Speculative Execution Without Compromising Privacy. MICRO 2021: 607-622 - [c48]Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, Carl A. Gunter:
DOVE: A Data-Oblivious Virtual Environment. NDSS 2021 - [c47]Riccardo Paccagnella, Licheng Luo, Christopher W. Fletcher:
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical. USENIX Security Symposium 2021: 645-662 - [c46]Jose Rodrigo Sanchez Vicarte, Gang Wang, Christopher W. Fletcher:
Double-Cross Attacks: Subverting Active Learning Systems. USENIX Security Symposium 2021: 1593-1610 - [i21]Vikram Sharma Mailthody, James Wei, Nicholas Chen, Mohammad Behnia, Ruihao Yao, Qihao Wang, Vedant Agrawal, Churan He, Lijian Wang, Leihao Chen, Amit Agarwal, Edward Richter, Wen-Mei Hwu, Christopher W. Fletcher, Jinjun Xiong, Andrew Miller, Sanjay Patel:
Safer Illinois and RokWall: Privacy Preserving University Health Apps for COVID-19. CoRR abs/2101.07897 (2021) - [i20]Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, Carl A. Gunter:
DOVE: A Data-Oblivious Virtual Environment. CoRR abs/2102.05195 (2021) - [i19]Kartik Hegde, Po-An Tsai, Sitao Huang, Vikas Chandra, Angshuman Parashar, Christopher W. Fletcher:
Mind Mappings: Enabling Efficient Algorithm-Accelerator Mapping Space Search. CoRR abs/2103.01489 (2021) - [i18]Riccardo Paccagnella, Licheng Luo, Christopher W. Fletcher:
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical. CoRR abs/2103.03443 (2021) - 2020
- [j8]Jiyong Yu, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas, Christopher W. Fletcher:
Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data. IEEE Micro 40(3): 81-90 (2020) - [j7]Dimitrios Skarlatos, Mengjia Yan, Bhargava Gopireddy, Read Sprabery, Josep Torrellas, Christopher W. Fletcher:
MicroScope: Enabling Microarchitectural Replay Attacks. IEEE Micro 40(3): 91-98 (2020) - [j6]Jiyong Yu, Lucas Hsiung, Mohamad El Hajj, Christopher W. Fletcher:
Creating Foundations for Secure Microarchitectures With Data-Oblivious ISA Extensions. IEEE Micro 40(3): 99-107 (2020) - [j5]Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
A Retrospective on Path ORAM. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(8): 1572-1576 (2020) - [c45]Zhangxiaowen Gong, Houxiang Ji, Christopher W. Fletcher, Christopher J. Hughes, Josep Torrellas:
SparseTrain: Leveraging Dynamic Sparsity in Software for Training DNNs on General-Purpose SIMD Processors. PACT 2020: 279-292 - [c44]Jose Rodrigo Sanchez Vicarte, Benjamin Schreiber, Riccardo Paccagnella, Christopher W. Fletcher:
Game of Threads: Enabling Asynchronous Poisoning Attacks. ASPLOS 2020: 35-52 - [c43]Po-An Tsai, Andrés Sánchez, Christopher W. Fletcher, Daniel Sánchez:
Safecracker: Leaking Secrets through Compressed Caches. ASPLOS 2020: 1125-1140 - [c42]Abdulrahman Mahmoud, Neeraj Aggarwal, Alex Nobbe, Jose Rodrigo Sanchez Vicarte, Sarita V. Adve, Christopher W. Fletcher, Iuri Frosio, Siva Kumar Sastry Hari:
PyTorchFI: A Runtime Perturbation Tool for DNNs. DSN Workshops 2020: 25-31 - [c41]Jiyong Yu, Namrata Mantri, Josep Torrellas, Adam Morrison, Christopher W. Fletcher:
Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution. ISCA 2020: 707-720 - [c40]Zhangxiaowen Gong, Houxiang Ji, Christopher W. Fletcher, Christopher J. Hughes, Sara S. Baghsorkhi, Josep Torrellas:
SAVE: Sparsity-Aware Vector Engine for Accelerating DNN Training and Inference on CPUs. MICRO 2020: 796-810 - [c39]Zirui Neil Zhao, Houxiang Ji, Mengjia Yan, Jiyong Yu, Christopher W. Fletcher, Adam Morrison, Darko Marinov, Josep Torrellas:
Speculation Invariance (InvarSpec): Faster Safe Execution Through Program Analysis. MICRO 2020: 1138-1152 - [c38]Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher W. Fletcher, Andrew Miller, Dave Tian:
Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution. NDSS 2020 - [c37]Sandeep Dasgupta, Sushant Dinesh, Deepan Venkatesh, Vikram S. Adve, Christopher W. Fletcher:
Scalable validation of binary lifters. PLDI 2020: 655-671 - [c36]Mengjia Yan, Christopher W. Fletcher, Josep Torrellas:
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures. USENIX Security Symposium 2020: 2003-2020 - [i17]Abdulrahman Mahmoud, Siva Kumar Sastry Hari, Christopher W. Fletcher, Sarita V. Adve, Charbel Sakr, Naresh R. Shanbhag, Pavlo Molchanov, Michael B. Sullivan, Timothy Tsai, Stephen W. Keckler:
HarDNN: Feature Map Vulnerability Evaluation in CNNs. CoRR abs/2002.09786 (2020) - [i16]Mohammad Behnia, Prateek Sahu, Riccardo Paccagnella, Jiyong Yu, Zirui Neil Zhao, Xiang Zou, Thomas Unterluggauer, Josep Torrellas, Carlos V. Rozas, Adam Morrison, Frank McKeen, Fangfei Liu, Ron Gabor, Christopher W. Fletcher, Abhishek Basak, Alaa R. Alameldeen:
Speculative Interference Attacks: Breaking Invisible Speculation Schemes. CoRR abs/2007.11818 (2020)
2010 – 2019
- 2019
- [j4]Ling Ren, Christopher W. Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas:
Design and Implementation of the Ascend Secure Processor. IEEE Trans. Dependable Secur. Comput. 16(2): 204-216 (2019) - [c35]Michael Pellauer, Yakun Sophia Shao, Jason Clemons, Neal Clayton Crago, Kartik Hegde, Rangharajan Venkatesan, Stephen W. Keckler, Christopher W. Fletcher, Joel S. Emer:
Buffets: An Efficient and Composable Storage Idiom for Explicit Decoupled Data Orchestration. ASPLOS 2019: 137-151 - [c34]Abdulrahman Mahmoud, Radha Venkatagiri, Khalique Ahmed, Sasa Misailovic, Darko Marinov, Christopher W. Fletcher, Sarita V. Adve:
Minotaur: Adapting Software Testing Techniques for Hardware Errors. ASPLOS 2019: 1087-1103 - [c33]Radha Venkatagiri, Khalique Ahmed, Abdulrahman Mahmoud, Sasa Misailovic, Darko Marinov, Christopher W. Fletcher, Sarita V. Adve:
gem5-Approxilyzer: An Open-Source Tool for Application-Level Soft Error Analysis. DSN 2019: 214-221 - [c32]Dimitrios Skarlatos, Mengjia Yan, Bhargava Gopireddy, Read Sprabery, Josep Torrellas, Christopher W. Fletcher:
MicroScope: enabling microarchitectural replay attacks. ISCA 2019: 318-331 - [c31]Mengjia Yan, Jen-Yang Wen, Christopher W. Fletcher, Josep Torrellas:
SecDir: a secure directory to defeat directory side-channel attacks. ISCA 2019: 332-345 - [c30]Kartik Hegde, Hadi Asghari Moghaddam, Michael Pellauer, Neal Clayton Crago, Aamer Jaleel, Edgar Solomonik, Joel S. Emer, Christopher W. Fletcher:
ExTensor: An Accelerator for Sparse Tensor Algebra. MICRO 2019: 319-333 - [c29]Jiyong Yu, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas, Christopher W. Fletcher:
Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data. MICRO 2019: 954-968 - [c28]Mengjia Yan, Jiho Choi, Dimitrios Skarlatos, Adam Morrison, Christopher W. Fletcher, Josep Torrellas:
InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy (Corrigendum). MICRO 2019: 1076 - [c27]Jiyong Yu, Lucas Hsiung, Mohamad El Hajj, Christopher W. Fletcher:
Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. NDSS 2019 - [c26]Mengjia Yan, Read Sprabery, Bhargava Gopireddy, Christopher W. Fletcher, Roy H. Campbell, Josep Torrellas:
Attack Directories, Not Caches: Side Channel Attacks in a Non-Inclusive World. IEEE Symposium on Security and Privacy 2019: 888-904 - [i15]Zhangxiaowen Gong, Houxiang Ji, Christopher W. Fletcher, Christopher J. Hughes, Josep Torrellas:
SparseTrain: Leveraging Dynamic Sparsity in Training DNNs on General-Purpose SIMD Processors. CoRR abs/1911.10175 (2019) - 2018
- [j3]Emil Stefanov, Marten van Dijk, Elaine Shi, T.-H. Hubert Chan, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
Path ORAM: An Extremely Simple Oblivious RAM Protocol. J. ACM 65(4): 18:1-18:26 (2018) - [c25]Kartik Hegde, Jiyong Yu, Rohit Agrawal, Mengjia Yan, Michael Pellauer, Christopher W. Fletcher:
UCNN: Exploiting Computational Reuse in Deep Neural Networks via Weight Repetition. ISCA 2018: 674-687 - [c24]Mengjia Yan, Jiho Choi, Dimitrios Skarlatos, Adam Morrison, Christopher W. Fletcher, Josep Torrellas:
InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy. MICRO 2018: 428-441 - [c23]Kartik Hegde, Rohit Agrawal, Yulun Yao, Christopher W. Fletcher:
Morph: Flexible Acceleration for 3D CNN-Based Video Understanding. MICRO 2018: 933-946 - [c22]Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher:
ZeroTrace : Oblivious Memory Primitives from Intel SGX. NDSS 2018 - [i14]Kartik Hegde, Jiyong Yu, Rohit Agrawal, Mengjia Yan, Michael Pellauer, Christopher W. Fletcher:
UCNN: Exploiting Computational Reuse in Deep Neural Networks via Weight Repetition. CoRR abs/1804.06508 (2018) - [i13]Mengjia Yan, Christopher W. Fletcher, Josep Torrellas:
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures. CoRR abs/1808.04761 (2018) - [i12]Kartik Hegde, Rohit Agrawal, Yulun Yao, Christopher W. Fletcher:
Morph: Flexible Acceleration for 3D CNN-based Video Understanding. CoRR abs/1810.06807 (2018) - [i11]Jiyong Yu, Lucas Hsiung, Mohamad El Hajj, Christopher W. Fletcher:
Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. IACR Cryptol. ePrint Arch. 2018: 808 (2018) - 2017
- [c21]Kartik Nayak, Christopher W. Fletcher, Ling Ren, Nishanth Chandran, Satya V. Lokam, Elaine Shi, Vipul Goyal:
HOP: Hardware makes Obfuscation Practical. NDSS 2017 - [c20]Ittai Abraham, Christopher W. Fletcher, Kartik Nayak, Benny Pinkas, Ling Ren:
Asymptotically Tight Bounds for Composing ORAM with PIR. Public Key Cryptography (1) 2017: 91-120 - [i10]Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher:
ZeroTrace : Oblivious Memory Primitives from Intel SGX. IACR Cryptol. ePrint Arch. 2017: 549 (2017) - 2016
- [b1]Christopher W. Fletcher:
Oblivious RAM: from theory to practice. Massachusetts Institute of Technology, Cambridge, USA, 2016 - [c19]Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi, Daniel Wichs:
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM. TCC (A2) 2016: 145-174 - 2015
- [c18]Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten van Dijk, Srinivas Devadas:
Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM. ASPLOS 2015: 103-116 - [c17]Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten van Dijk, Emil Stefanov, Dimitrios N. Serpanos, Srinivas Devadas:
A Low-Latency, Low-Area Hardware Oblivious RAM Controller. FCCM 2015: 215-222 - [c16]Xiangyao Yu, Syed Kamran Haider, Ling Ren, Christopher W. Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas:
PrORAM: dynamic prefetcher for oblivious RAM. ISCA 2015: 616-628 - [c15]Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, Srinivas Devadas:
Constants Count: Practical Improvements to Oblivious RAM. USENIX Security Symposium 2015: 415-430 - [i9]Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren:
Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE). IACR Cryptol. ePrint Arch. 2015: 5 (2015) - [i8]Christopher W. Fletcher, Muhammad Naveed, Ling Ren, Elaine Shi, Emil Stefanov:
Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM. IACR Cryptol. ePrint Arch. 2015: 1065 (2015) - 2014
- [c14]Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Marten van Dijk, Omer Khan, Srinivas Devadas:
Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs. HPCA 2014: 213-224 - [c13]G. Edward Suh, Christopher W. Fletcher, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas:
Author retrospective AEGIS: architecture for tamper-evident and tamper-resistant processing. ICS 25th Anniversary 2014: 68-70 - [i7]Ling Ren, Christopher W. Fletcher, Xiangyao Yu, Albert Kwon, Marten van Dijk, Srinivas Devadas:
Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness. IACR Cryptol. ePrint Arch. 2014: 205 (2014) - [i6]Xiangyao Yu, Ling Ren, Christopher W. Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas:
Enhancing Oblivious RAM Performance Using Dynamic Prefetching. IACR Cryptol. ePrint Arch. 2014: 234 (2014) - [i5]Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten van Dijk, Emil Stefanov, Srinivas Devadas:
RAW Path ORAM: A Low-Latency, Low-Area Hardware ORAM Controller with Integrity Verification. IACR Cryptol. ePrint Arch. 2014: 431 (2014) - [i4]Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, Srinivas Devadas:
Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM. IACR Cryptol. ePrint Arch. 2014: 997 (2014) - 2013
- [c12]Xiangyao Yu, Christopher W. Fletcher, Ling Ren, Marten van Dijk, Srinivas Devadas:
Generalized external interaction with tamper-resistant hardware with bounded information leakage. CCSW 2013: 23-34 - [c11]Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
Path ORAM: an extremely simple oblivious RAM protocol. CCS 2013: 299-310 - [c10]Ling Ren, Christopher W. Fletcher, Xiangyao Yu, Marten van Dijk, Srinivas Devadas:
Integrity verification for path Oblivious-RAM. HPEC 2013: 1-6 - [c9]Ling Ren, Xiangyao Yu, Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas:
Design space exploration and optimization of path oblivious RAM in secure processors. ISCA 2013: 571-582 - [c8]Christopher W. Fletcher, Rachael Harding, Omer Khan, Srinivas Devadas:
A framework to accelerate sequential programs on homogeneous multicores. VLSI-SoC 2013: 344-347 - [i3]Ling Ren, Xiangyao Yu, Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas:
Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors. IACR Cryptol. ePrint Arch. 2013: 76 (2013) - [i2]Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
Path ORAM: An Extremely Simple Oblivious RAM Protocol. IACR Cryptol. ePrint Arch. 2013: 280 (2013) - 2012
- [j2]Ilia A. Lebedev, Christopher W. Fletcher, Shaoyi Cheng, James C. Martin, Austin Doupnik, Daniel Burke, Mingjie Lin, John Wawrzynek:
Exploring Many-Core Design Templates for FPGAs and ASICs. Int. J. Reconfigurable Comput. 2012: 439141:1-439141:15 (2012) - [j1]Pengju Ren, Mieszko Lis, Myong Hyon Cho, Keun Sup Shim, Christopher W. Fletcher, Omer Khan, Nanning Zheng, Srinivas Devadas:
HORNET: A Cycle-Level Multicore Simulator. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 31(6): 890-903 (2012) - [c7]Christopher W. Fletcher, Rachael Harding, Omer Khan, Srinivas Devadas:
A low-overhead dynamic optimization framework for multicores. PACT 2012: 467-468 - [c6]Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas:
Towards an interpreter for efficient encrypted computation. CCSW 2012: 83-94 - [i1]Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas:
Compilation Techniques for Efficient Encrypted Computation. IACR Cryptol. ePrint Arch. 2012: 266 (2012) - 2011
- [c5]Christopher W. Fletcher, Ilia A. Lebedev, Narges Bani Asadi, Daniel Burke, John Wawrzynek:
Bridging the GPGPU-FPGA efficiency gap. FPGA 2011: 119-122 - [c4]Mieszko Lis, Pengju Ren, Myong Hyon Cho, Keun Sup Shim, Christopher W. Fletcher, Omer Khan, Srinivas Devadas:
Scalable, accurate multicore simulation in the 1000-core era. ISPASS 2011: 175-185 - [c3]Mieszko Lis, Keun Sup Shim, Myong Hyon Cho, Christopher W. Fletcher, Michel A. Kinsy, Ilia A. Lebedev, Omer Khan, Srinivas Devadas:
Brief announcement: distributed shared memory based on computation migration. SPAA 2011: 253-256 - 2010
- [c2]Narges Bani Asadi, Christopher W. Fletcher, Greg Gibeling, John Wawrzynek, Wing H. Wong, Garry P. Nolan:
ParaLearn: a massively parallel, scalable system for learning interaction networks on FPGAs. ICS 2010: 83-94 - [c1]Ilia A. Lebedev, Shaoyi Cheng, Austin Doupnik, James C. Martin, Christopher W. Fletcher, Daniel Burke, Mingjie Lin, John Wawrzynek:
MARC: A Many-Core Approach to Reconfigurable Computing. ReConFig 2010: 7-12
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint