Follow
Adam Morrison
Adam Morrison
Associate Professor, Tel Aviv University
Verified email at cs.tau.ac.il - Homepage
Title
Cited by
Cited by
Year
Invisispec: Making speculative execution invisible in the cache hierarchy
M Yan, J Choi, D Skarlatos, A Morrison, C Fletcher, J Torrellas
2018 51st Annual IEEE/ACM International Symposium on Microarchitecture …, 2018
3322018
Speculative taint tracking (stt) a comprehensive protection for speculatively accessed data
J Yu, M Yan, A Khyzha, A Morrison, J Torrellas, CW Fletcher
Proceedings of the 52nd Annual IEEE/ACM International Symposium on …, 2019
2042019
Fast concurrent queues for x86 processors
A Morrison, Y Afek
Proceedings of the 18th ACM SIGPLAN symposium on Principles and practice of …, 2013
1732013
Limitations of highly-available eventually-consistent data stores
H Attiya, F Ellen, A Morrison
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing …, 2015
1082015
The CB tree: a practical concurrent self-adjusting search tree
Y Afek, H Kaplan, B Korenfeld, A Morrison, RE Tarjan
Distributed computing 27 (6), 393-417, 2014
942014
Specification and complexity of collaborative text editing
H Attiya, S Burckhardt, A Gotsman, A Morrison, H Yang, M Zawirski
Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing …, 2016
802016
Speculative interference attacks: Breaking invisible speculation schemes
M Behnia, P Sahu, R Paccagnella, J Yu, ZN Zhao, X Zou, T Unterluggauer, ...
Proceedings of the 26th ACM International Conference on Architectural …, 2021
732021
True IOMMU protection from DMA attacks: When copy is faster than zero copy
A Markuze, A Morrison, D Tsafrir
Proceedings of the Twenty-First International Conference on Architectural …, 2016
732016
Speculative data-oblivious execution: Mobilizing safe prediction for safe and efficient speculative execution
J Yu, N Mantri, J Torrellas, A Morrison, CW Fletcher
2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture …, 2020
562020
Software-improved hardware lock elision
Y Afek, A Levy, A Morrison
Proceedings of the 2014 ACM symposium on Principles of distributed computing …, 2014
542014
Opening pandora’s box: A systematic study of new ways microarchitecture can leak private data
JRS Vicarte, P Shome, N Nayak, C Trippel, A Morrison, D Kohlbrenner, ...
2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture …, 2021
462021
Common2 extended to stacks and unbounded concurrency
Y Afek, E Gafni, A Morrison
Proceedings of the twenty-fifth annual ACM symposium on Principles of …, 2006
432006
Augury: Using data memory-dependent prefetchers to leak data at rest
JRS Vicarte, M Flanders, R Paccagnella, G Garrett-Grossman, A Morrison, ...
2022 IEEE Symposium on Security and Privacy (SP), 1491-1505, 2022
412022
Cache index-aware memory allocation
Y Afek, D Dice, A Morrison
ACM SIGPLAN Notices 46 (11), 55-64, 2011
412011
Predicate rcu: An rcu for scalable concurrent updates
M Arbel, A Morrison
ACM SIGPLAN Notices 50 (8), 21-30, 2015
392015
Utilizing the {IOMMU} scalably
O Peleg, A Morrison, B Serebrin, D Tsafrir
2015 USENIX Annual Technical Conference (USENIX ATC 15), 549-562, 2015
392015
An analysis of speculative type confusion vulnerabilities in the wild
O Kirzner, A Morrison
30th USENIX Security Symposium (USENIX Security 21), 2399-2416, 2021
362021
Speculation invariance (invarspec): Faster safe execution through program analysis
ZN Zhao, H Ji, M Yan, J Yu, CW Fletcher, A Morrison, D Marinov, ...
2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture …, 2020
362020
Autonomous NIC offloads
B Pismenny, H Eran, A Yehezkel, L Liss, A Morrison, D Tsafrir
Proceedings of the 26th ACM International Conference on Architectural …, 2021
342021
Getting to the root of concurrent binary search tree performance
M Arbel-Raviv, T Brown, A Morrison
2018 USENIX Annual Technical Conference (USENIX ATC 18), 295-306, 2018
322018
The system can't perform the operation now. Try again later.
Articles 1–20