Name
Affiliation
Papers
MOHIT TIWARI
University of California, Berkeley
42
Collaborators
Citations 
PageRank 
113
445
23.94
Referers 
Referees 
References 
943
1303
665
Search Limit
1001000
Title
Citations
PageRank
Year
Power-based Attacks on Spatial DNN Accelerators00.342022
Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange and Encapsulation Protocols10.352021
Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and Hardware00.342021
ACHyb: a hybrid analysis approach to detect kernel access control vulnerabilities00.342021
Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and Hardware00.342021
ρ: Relaxed Hierarchical ORAM20.372019
Morpheus: A Vulnerability-Tolerant Secure Architecture Based on Ensembles of Moving Target Defenses with Churn30.392019
Cyclone: Detecting Contention-Based Cache Information Leaks Through Cyclic Interference20.362019
Horizontal side-channel vulnerabilities of post-quantum key exchange protocols20.402018
The Shape of Alerts: Detecting Malware Using Distributed Detectors by Robustly Amplifying Transient Correlations.00.342018
Binary Ring-LWE hardware with power side-channel countermeasures.00.342018
Power to peep-all: Inference Attacks by Malicious Batteries on Mobile Devices.30.362018
Exploiting Latent Attack Semantics for Intelligent Malware Detection.00.342017
EMMA: A New Platform to Evaluate Hardware-based Mobile Malware Analyses.10.352016
On Architectural Support for Systems Security.00.342016
Secure, Precise, And Fast Floating-Point Operations On X86 Processors30.372016
Invited - Who is the major threat to tomorrow's security?: you, the hardware designer30.372016
Quantifying and improving the efficiency of hardware-based mobile malware detectors.30.362016
GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation451.212015
Raccoon: closing digital side-channels through obfuscated execution370.912015
Understanding contention-based channels and using them for defense280.792015
Sapper: a language for hardware-level security policy enforcement330.992014
Morpheus: benchmarking computational diversity in mobile malware50.452014
Gate-Level Information Flow Tracking for Security Lattices50.452014
Position paper: Sapper -- a language for provable hardware policy enforcement10.362013
PHANTOM: practical oblivious computation in a secure processor791.932013
Dataflow Tomography: Information Flow Tracking For Understanding and Visualizing Full Systems20.382012
Opportunities and Challenges of Using Plasmonic Components in Nanophotonic Architectures50.522012
Language without words: A pointillist model for natural language processing00.342012
Context-centric security20.392012
On the Complexity of Generating Gate Level Information Flow Tracking Logic90.532012
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security511.712011
Caisson: a hardware description language for secure information flow381.092011
Information flow isolation in I2C and USB150.722011
Fighting fire with fire: modeling the datacenter-scale effects of targeted superlattice thermal management120.682011
Function flattening for lease-based, information-leak-free systems00.342010
Theoretical analysis of gate level information flow tracking120.742010
Secure information flow analysis for hardware design: using the right abstraction for the job40.422010
Hardware assistance for trustworthy systems through 3-D integration80.582010
Hardware trust implications of 3-D integration40.502010
Gate-Level Information-Flow Tracking for Secure Architectures60.552010
Execution leases: a hardware-supported mechanism for enforcing strong non-interference211.002009