Towards a Formally Verified Security Monitor for VM-based Confidential ComputingWojciech OzgaGuerney Huntet al.2023MICRO 2023
From Confidential Computing to Zero Trust, Come Along for the (Bumpy?) RideMengmei YeSandhya Koteshwaraet al.2024MICRO 2024
Cloud bursting an EDA workload with ML-driven technique for future SoC developmentWachirawit PonghiranJinwook Jung2024VLSI Technology and Circuits 2024
Fully Homomorphic Encryption for Computer Architects: A Fundamental Characterization StudySubhankar PalKarthik Swaminathanet al.2023MICRO 2023
Modeling and Estimation of LPAR Energy Consumption for IBM POWER9 SystemsNiteesh DubeyJoefon Jannet al.2023MASCOTS 2023
To virtualize or not to virtualize AI Infrastructure: A perspectiveSeetharami SeelamApoorve Mohanet al.2023ISCA 2023
High-NA EUV Exposure Tool Implications to Chip and Mask LayoutsDaniel Schmidt2023VLSI Technology 2023
Workshop on Data Integrity and Secure Cloud Computing (DISCC)Pradip BoseAugusto Vegaet al.2025HPCA 2025
CogArch 2024: 8th Workshop on Cognitive ArchitecturesKarthik SwaminathanSubhankar Palet al.2024ISCA 2024