Follow
Tamara Silbergleit Lehman
Title
Cited by
Cited by
Year
PoisonIvy: Safe speculation for secure memory
TS Lehman, AD Hilton, BC Lee
2016 49th Annual IEEE/ACM International Symposium on Microarchitecture …, 2016
662016
Cryptographic cache lines for a trusted execution environment
S Chhabra, FX McKeen, CV Rozas, S Komijani, TS Lehman
US Patent 9,904,805, 2018
522018
Analyzing Twitter users' behavior before and after contact by the Russia's Internet Research Agency
U Dutta, R Hanscom, JS Zhang, R Han, T Lehman, Q Lv, S Mishra
Proceedings of the ACM on Human-Computer Interaction 5 (CSCW1), 1-24, 2021
202021
Maps: Understanding metadata access patterns in secure memory
TS Lehman, AD Hilton, BC Lee
2018 IEEE international symposium on performance analysis of systems and …, 2018
182018
Cryptographic cache lines for a trusted execution environment
S Chhabra, FX McKeen, CV Rozas, S Komijani, TS Lehman
US Patent 10,325,118, 2019
152019
Do Twitter users change their behavior after exposure to misinformation? An in-depth analysis
Y Wang, R Han, TS Lehman, Q Lv, S Mishra
Social network analysis and mining 12 (1), 167, 2022
92022
Analyzing behavioral changes of twitter users after exposure to misinformation
Y Wang, R Han, T Lehman, Q Lv, S Mishra
Proceedings of the 2021 IEEE/ACM international conference on advances in …, 2021
72021
Understanding how readers determine the legitimacy of online news articles in the era of fake news
S Pidikiti, JS Zhang, R Han, T Lehman, Q Lv, S Mishra
2020 IEEE/ACM International Conference on Advances in Social Networks …, 2020
72020
Acuerdo: Fast atomic broadcast over RDMA
J Izraelevitz, G Wang, R Hanscom, K Silvers, TS Lehman, G Chockler, ...
Proceedings of the 51st International Conference on Parallel Processing, 1-11, 2022
22022
A new foe in GPUs: Power side-channel attacks on neural network
H Jeon, N Karimian, T Lehman
2021 22nd International Symposium on Quality Electronic Design (ISQED), 313-313, 2021
22021
Eliminating Micro-Architectural Side-Channel Attacks using Near Memory Processing
C Nelson, J Izraelevitz, RI Bahar, TS Lehman
2022 IEEE International Symposium on Secure and Private Execution …, 2022
12022
Baobab Merkle Tree for Efficient Secure Memory
S Thomas, K Workneh, AT Ishimwe, Z McKevitt, P Curlin, RI Bahar, ...
IEEE Computer Architecture Letters, 2024
2024
SpecCheck: A Tool for Systematic Identification of Vulnerable Transient Execution in gem5
Z McKevitt, A Trivedi, TS Lehman
2023 32nd International Conference on Parallel Architectures and Compilation …, 2023
2023
Understanding How Readers Determine the Legitimacy of Online Medical News Articles in the Era of Fake News
S Pidikiti, JS Zhang, R Han, TS Lehman, Q Lv, S Mishra
Disease Control Through Social Network Surveillance, 55-75, 2022
2022
Design Strategies for Efficient and Secure Memory
TS Lehman
Duke University, 2019
2019
Using a Fast Subtree for Efficient Secure NVMs
S Thomas, K Workneh, J McCarty, J Izraelevitz, T Lehman, RI Bahar
Ahmed ElTantawy, AMD Bahar Asgari, Google/UMD Brandon Reagen, New York University Chia-Lin Yang, National Taiwan University
C Hughes, C Hughes, D Kaeli, D Mahajan, DH Woo, D Li, F Yao, F Guo, ...
ICCD 2021
G Byrd, D Tiwari, W Wang, S Cho, T Lehman, D Kaeli, C Tan, J Jeong, ...
IISWC 2022
A Jain, A Hankin, A Zinenko, A Mazumdar, A Samajdar, A Amarnath, ...
Investigating the Potential for Near Data Processing to Reduce Secure Memory Overheads
C Nelson, RI Bahar, T Lehman
The system can't perform the operation now. Try again later.
Articles 1–20