Michael LeMay
Michael LeMay
Home
Projects
Talks
Publications
Patents
Skills
Service
Hobbies
Contact
Posts
Light
Dark
Automatic
1
Memory Tagging using Cryptographic Memory Integrity on Commodity x86 CPUs (runner-up for distinguished paper award 🏆)
David Schrammel
,
Martin Unterguggenberger
,
Lukas Lamster
,
Salmin Sultana
,
Karanvir Grewal
,
Michael LeMay
,
David M. Durham
,
Stefan Mangard
PDF
MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware
David Schrammel
,
Salmin Sultana
,
Michael LeMay
,
David Durham
,
Martin Unterguggenberger
,
Pascal Nasahl
,
Stefan Mangard
DOI
EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks
Pascal Nasahl
,
Salmin Sultana
,
Hans Liljestrand
,
Karanvir Grewal
,
Michael LeMay
,
David M. Durham
,
David Schrammel
,
Stefan Mangard
DOI
Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI (distinguished paper award 🏆)
Shravan Narayan
,
Tal Garfinkel
,
Mohammadkazem Taram
,
Joey Rudek
,
Daniel Moghimi
,
Evan Johnson
,
Chris Fallin
,
Anjo Vahldiek-Oberwagner
,
Michael LeMay
,
Ravi Sahita
,
Dean Tullsen
,
Deian Stefan
PDF
Video
DOI
Isolation without Taxation: Near-Zero-Cost Transitions for WebAssembly and SFI
Matthew Kolosick
,
Shravan Ravi Narayan
,
Evan Johnson
,
Conrad Watt
,
Michael LeMay
,
Deepak Garg
,
Ranjit Jhala
,
Deian Stefan
PDF
Project
Video
DOI
Cryptographic Capability Computing
Michael LeMay
,
Joydeep Rakshit
,
Sergej Deutsch
,
David M. Durham
,
Santosh Ghosh
,
Anant Nori
,
Jayesh Gaur
,
Andrew Weiler
,
Salmin Sultana
,
Karanvir Grewal
,
Sreenivas Subramoney
DOI
Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware
We developed a Network-on-Chip (NoC) firewall in Bluespec SystemVerilog configured by a dedicated core, and we demonstrated how it can enforce isolation between two instances of Linux on separate cores. We developed a shallow embedding of a subset of Bluespec into Maude, since both languages are based on term rewriting systems, and we used a Maude model of the NoC firewall to precisely identify a subtle vulnerability.
Michael LeMay
,
Carl A. Gunter
PDF
DOI
Reliable telemetry in white spaces using remote attestation
Omid Fatemieh
,
Michael LeMay
,
Carl A. Gunter
PDF
Slides
DOI
Enforcing Executing-Implies-Verified with the Integrity-Aware Processor
Extended a processor core written in VHDL with hardware support for detecting attempts to execute unverified code. Developed an integrity kernel and network server to enforce code whitelisting using processor extensions. Evaluated using an FPGA.
Michael LeMay
,
Carl A. Gunter
PDF
Slides
DOI
Diagnostic Powertracing for Sensor Node Failure Analysis
Yong Yang
,
Lu Su
,
Mohammad Khan
,
Michael LeMay
,
Tarek Abdelzaher
,
Jiawei Han
PDF
DOI
»
Cite
×