Follow
Komail Dharsee
Komail Dharsee
Verified email at cs.rochester.edu
Title
Cited by
Cited by
Year
Holistic {Control-Flow} protection on {Real-Time} embedded systems with kage
Y Du, Z Shen, K Dharsee, J Zhou, RJ Walls, J Criswell
31st USENIX Security Symposium (USENIX Security 22), 2281-2298, 2022
202022
Fast execute-only memory for embedded systems
Z Shen, K Dharsee, J Criswell
2020 IEEE Secure Development (SecDev), 7-14, 2020
102020
A software solution for hardware vulnerabilities
K Dharsee, E Johnson, J Criswell
2017 IEEE Cybersecurity Development (SecDev), 27-33, 2017
72017
Randezvous: Making Randomization Effective on MCUs
Z Shen, K Dharsee, J Criswell
Proceedings of the 38th Annual Computer Security Applications Conference, 28-41, 2022
42022
Hardware vulnerability and mitigation survey
K Dharsee, E Johnson, J Criswell
42017
Jinn: hijacking safe programs with trojans
K Dharsee, J Criswell
32nd USENIX Security Symposium (USENIX Security 23), 6965-6982, 2023
32023
Secure guest virtual machine support in apparition
E Johnson, K Dharsee, J Criswell
Proceedings of the 15th ACM SIGPLAN/SIGOPS International Conference on …, 2019
12019
Critical Hardware Towards Software Security Enforcement
K Dharsee
University of Rochester, 2023
2023
Hardware Vulnerability and Mitigation Survey Technical Report# 1000
K Dharsee, E Johnson, J Criswell
The system can't perform the operation now. Try again later.
Articles 1–9