Tyler Bletsch
Tyler Bletsch
Verified email at
Cited by
Cited by
Jump-oriented programming: a new class of code-reuse attack
T Bletsch, X Jiang, VW Freeh, Z Liang
Proceedings of the 6th ACM symposium on information, computer and …, 2011
Adagio: making DVS practical for complex HPC applications
B Rountree, DK Lownenthal, BR De Supinski, M Schulz, VW Freeh, ...
Proceedings of the 23rd international conference on Supercomputing, 460-469, 2009
Just-in-time dynamic voltage scaling: Exploiting inter-node slack to save energy in mpi programs
VW Freeh, N Kappiah, DK Lowenthal, TK Bletsch
Journal of Parallel and Distributed Computing 68 (9), 1175-1185, 2008
On the expressiveness of return-into-libc attacks
M Tran, M Etheridge, T Bletsch, X Jiang, V Freeh, P Ning
Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011
Mitigating code-reuse attacks with control-flow locking
T Bletsch, X Jiang, V Freeh
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
The effect of aging on low-fat, reduced-fat, and full-fat Cheddar cheese texture
NR Rogers, MA Drake, CR Daubert, DJ McMahon, TK Bletsch, ...
Journal of Dairy Science 92 (10), 4756-4772, 2009
Comprehensive and efficient protection of kernel control data
J Li, Z Wang, T Bletsch, D Srinivasan, M Grace, X Jiang
IEEE Transactions on Information Forensics and Security 6 (4), 1404-1417, 2011
Padd: Power aware domain distribution
MY Lim, F Rawson, T Bletsch, VW Freeh
2009 29th IEEE International Conference on Distributed Computing Systems …, 2009
Method and system for estimating processor utilization from power measurements
WM Felter, CR Lefurgy, T Bletsch
US Patent 7,925,901, 2011
Estimating power consumption of computing components configured in a computing system
TK Bletsch, A Dholakia, WM Felter, CR Lefurgy
US Patent 8,041,521, 2011
Method for equalizing performance of computing components
TK Bletsch, WM Felter, NA Gazala, T Horvath, CR Lefurgy
US Patent 7,979,729, 2011
Scaling and packing on a chip multiprocessor
VW Freeh, TK Bletsch, FL Rawson
2007 IEEE International Parallel and Distributed Processing Symposium, 1-8, 2007
Learning to mitigate rowhammer attacks
BK Joardar, TK Bletsch, K Chakrabarty
2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), 564-567, 2022
Machine learning-based Rowhammer mitigation
BK Joardar, TK Bletsch, K Chakrabarty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2022
Code-reuse attacks: new frontiers and defenses
T Bletsch
North Carolina State University, 2011
Power Aware Domain Migration in a Virtualized Cluster
T Bletsch, MY Lim, V Freeh
Simply-track-and-refresh: Efficient and scalable rowhammer mitigation
E Ortega, T Bletsch, B Joardar, J Talukdar, W Paik, K Chakrabarty
2023 IEEE International Test Conference (ITC), 340-349, 2023
Rowhammer Vulnerability of DRAMs in 3-D Integration
E Ortega, J Talukdar, W Paik, T Bletsch, K Chakrabarty
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2024
de Supinski, Martin Schulz, Vincent W
B Rountree, DK Lownenthal, R Bronis
Freeh, and Tyler Bletsch,“Adagio: Making DVS Practical for Complex HPC …, 2009
Using Kernel Instrumentation to Improve CPU Scaling Strategy
T Bletsch
The system can't perform the operation now. Try again later.
Articles 1–20