Positions

Publications

Academic Article

Year Title
2015 Signature-Based Protection from Code Reuse AttacksIEEE Transactions on Computers.  64:533-546. 2015
2014 Efficiently Securing Systems from Code Reuse AttacksIEEE Transactions on Computers.  63:1144-1156. 2014
2011 A mash-up application utilizing hybridized filtering techniques for recommending events at a social networking siteSocial Network Analysis and Mining.  1:231-239. 2011
2010 Data processing and communication strategies for lifetime optimization in wireless sensor networksAEU - International Journal of Electronics and Communications.  64:992-998. 2010

Conference Proceeding

Year Title
2017 ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN). 237-248. 2017
2017 RIC: Relaxed Inclusion Caches for Mitigating LLC Side-Channel AttacksProceedings - Design Automation Conference. 2017
2017 RIC: Relaxed Inclusion Caches for Mitigating LLC Side-Channel Attacks.DAC. 7:1-7:1. 2017
2016 A High-Resolution Side-Channel Attack on Last-Level Cache2016 ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC). 72:1-72:1. 2016
2013 SCRAP: Architecture for Signature-Based Protection from Code Reuse AttacksIEEE High-Performance Computer Architecture Symposium Proceedings Proceedings - International Symposium on High-Performance Computer Architecture. 258-269. 2013
2012 Branch Regulation: Low-Overhead Protection from Code Reuse AttacksProceedings - International Symposium on Computer Architecture. 94-105. 2012
2012 Exploiting Bus Level and Bit Level Inactivity for Preventing Wire Degradation due to Electromigration.DSD. 280-287. 2012
2012 Improving the Soft Error Resilience of the Register Files Using SRAM Bitcells with Built-In Comparators.DSD. 140-143. 2012
2010 Dynamic Register File Partitioning in Superscalar Microprocessors for Energy EfficiencyIEEE International Conference on Computer Design - VLSI in Computers and Processors. 515-520. 2010
2010 Exploiting Inactive Rename Slots for Detecting Soft ErrorsLecture Notes in Computer Science. 126-+. 2010
2009 A Collaborative and Content Based Event Recommendation System Integrated With Data Collection Scrapers and Services at a Social Networking Site2009 INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING. 113-118. 2009
2009 Data Processing and Communication Strategies for Lifetime Optimization in Wireless Sensor Networks2009 IEEE 17TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, VOLS 1 AND 2. 979-981. 2009

Teaching Activities

  • Computer Organization Taught course 2018
  • Computer Organization Taught course 2018
  • Computer Organization Taught course 2018
  • Digital Systems Taught course 2018
  • Digital Systems Taught course 2018
  • Computer Organization Taught course 2017
  • Full Name

  • Mehmet Kayaalp