Simha Sethumadhavan

Computer Science Columbia University, New York, NY 
Computer Architecture, Security, VLSI Design, High Performance Computing
"Simha Sethumadhavan"


Sign in to add trainee
John Demme grad student 2014 Columbia
Adam Waksman grad student 2014 Columbia
BETA: Related publications


You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Yuan X, Williams-King D, Yang J, et al. (2015) Making lock-free data structures verifiable with artificial transactions Proceedings of the 8th Workshop On Programming Languages and Operating Systems, Plos 2015. 39-45
Oren Y, Kemerlis VP, Sethumadhavan S, et al. (2015) The spy in the sandbox: Practical cache attacks in JavaScript and their implications Proceedings of the Acm Conference On Computer and Communications Security. 2015: 1406-1418
Tang A, Sethumadhavan S, Stolfo S. (2015) Heisenbyte: Thwarting memory disclosure attacks using destructive code reads Proceedings of the Acm Conference On Computer and Communications Security. 2015: 256-267
Sethumadhavan S, Waksman A, Suozzo M, et al. (2015) Trustworthy hardware from untrusted components Communications of the Acm. 58: 60-71
Demme J, Rajendran B, Nowick SM, et al. (2015) Increasing reconfigurability with memristive interconnects Proceedings of the 33rd Ieee International Conference On Computer Design, Iccd 2015. 351-358
Guo N, Huang Y, Mai T, et al. (2015) Continuous-time hybrid computation with programmable nonlinearities European Solid-State Circuits Conference. 2015: 279-282
Waksman A, Rajendran J, Suozzo M, et al. (2014) A red team/blue team assessment of functional analysis methods for malicious circuit identification Proceedings - Design Automation Conference
Vega A, Sethumadhavan S, Mitra S. (2014) Guest Editorial: Robust and energy-secure systems Ieee Journal On Emerging and Selected Topics in Circuits and Systems. 4: 165-168
Tang A, Sethumadhavan S, Stolfo SJ. (2014) Unsupervised anomaly-based malware detection using hardware features Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8688: 109-129
Waksman A, Suozzo M, Sethumadhavan S. (2013) FANCI: Identification of stealthy malicious logic using boolean functional analysis Proceedings of the Acm Conference On Computer and Communications Security. 697-708
See more...