Technologies by Moinuddin Qureshi
Cost-Effective Hydra Method Monitors DRAM Memory in Computers
Row-hammer security vulnerability is a fault in DRAM modules in computers
8933
Improve the Reliability of Quantum Computers by Mitigating Measurements Errors
Increases measurement accuracy by 2–3x via exploitation of state-dependent bias and orchestrating dissimilar mistakes
Increases measurement accuracy by 2–3x via exploitation of state-dependent bias and orchestrating dissimilar mistakes
8207, 8208
Protecting Cache Memories from Eviction-Based Attacks
An algorithm to protect against eviction-based cache side channel attacks, while incurring negligible storage and performance loss, and without relying on any operating system support.
An algorithm to protect against eviction-based cache side channel attacks, while incurring negligible storage and performance loss, and without relying on any operating system support.
7979
Zombie-Based Mitigation – Protecting Cache from Flush-Based Attack
An algorithm that tolerates flush-based cache attacks without requiring rewrite of applications or profile information, and retaining page sharing.
An algorithm that tolerates flush-based cache attacks without requiring rewrite of applications or profile information, and retaining page sharing.
8008