Follow
Alec Wolman
Alec Wolman
Microsoft Research
Verified email at microsoft.com - Homepage
Title
Cited by
Year
Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer
K Loughlin, J Rosenblum, S Saroiu, A Wolman, D Skarlatos, B Kasikci
Proceedings of the 29th Symposium on Operating Systems Principles, 417-433, 2023
42023
Accelerating Open RAN Research Through an Enterprise-scale 5G Testbed
P Bahl, M Balkwill, X Foukas, A Kalia, D Kim, M Kotaru, Z Lai, S Mehrotra, ...
Proceedings of the 29th Annual International Conference on Mobile Computing …, 2023
42023
Exploring practical vulnerabilities of machine learning-based wireless systems
Z Liu, C Xu, Y Xie, E Sie, F Yang, K Karwaski, G Singh, ZL Li, Y Zhou, ...
20th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2023
72023
Empowering azure storage with {RDMA}
W Bai, SS Abdeen, A Agrawal, KK Attre, P Bahl, A Bhagat, G Bhaskara, ...
20th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2023
322023
Moesi-prime: preventing coherence-induced hammering in commodity workloads
K Loughlin, S Saroiu, A Wolman, YA Manerkar, B Kasikci
Proceedings of the 49th Annual International Symposium on Computer …, 2022
292022
The price of secrecy: How hiding internal DRAM topologies hurts rowhammer defenses
S Saroiu, A Wolman, L Cojocar
2022 IEEE International Reliability Physics Symposium (IRPS), 2C. 3-1-2C. 3-6, 2022
292022
Software-defined memory controllers: An idea whose time has come
K Loughlin, S Saroiu, A Wolman, B Kasikci
Wild and Crazy Ideas (WACI) Session at ASPLOS, 2022
32022
How to configure row-sampling-based rowhammer defenses
S Saroiu, A Wolman
DRAMSec, 2022
152022
mfit: A bump-in-the-wire tool for plug-and-play analysis of rowhammer susceptibility factors
L Cojocar, K Loughlin, S Saroiu, B Kasikci, A Wolman
Technical Report–Microsoft Research, 2021
102021
MegaMind: a platform for security & privacy extensions for voice assistants
SMS Talebi, AA Sani, S Saroiu, A Wolman
Proceedings of the 19th Annual International Conference on Mobile Systems …, 2021
82021
Stop! hammer time: rethinking our approach to rowhammer mitigations
K Loughlin, S Saroiu, A Wolman, B Kasikci
Proceedings of the Workshop on Hot Topics in Operating Systems, 88-95, 2021
322021
Panopticon: A complete in-dram rowhammer mitigation
T Bennett, S Saroiu, A Wolman, L Cojocar
Workshop on DRAM Security (DRAMSec) 22, 110, 2021
462021
Are we susceptible to rowhammer? an end-to-end methodology for cloud providers
L Cojocar, J Kim, M Patel, L Tsai, S Saroiu, A Wolman, O Mutlu
2020 IEEE symposium on security and privacy (SP), 712-728, 2020
1142020
{PrivateEye}: Scalable and {Privacy-Preserving} Compromise Detection in the Cloud
B Arzani, S Ciraci, S Saroiu, A Wolman, J Stokes, G Outhred, L Diwu
17th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2020
242020
Trusted language runtime on a mobile platform
H Raj, N Santos, P England, S Saroiu, A Wolman
US Patent 10,496,824, 2019
792019
Energy-aware code offload for mobile devices
A Wolman, S Saroiu, R Chandra, P Bahl, A Balasubramanian, ...
US Patent 9,939,878, 2018
102018
Mcdnn: An execution framework for deep neural networks on resource-constrained devices
S Han, H Shen, M Philipose, S Agarwal, A Wolman, A Krishnamurthy
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
202016
Sealing secret data with a policy that includes a sensor-based constraint
S Saroiu, A Wolman, H Raj, H Liu
US Patent 9,411,970, 2016
742016
Mcdnn: An approximation-based execution framework for deep stream processing under resource constraints
S Han, H Shen, M Philipose, S Agarwal, A Wolman, A Krishnamurthy
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
4412016
Techniques for resource location and migration across data centers
JR Hamilton, MJ Manos, JD Dunagan, A Wolman, S Agarwal, M Zhang
US Patent 9,367,257, 2016
932016
The system can't perform the operation now. Try again later.
Articles 1–20