| Casa: End-to-end quantitative security analysis of randomly mapped caches T Bourgeat, J Drean, Y Yang, L Tsai, J Emer, M Yan 2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture …, 2020 | 69 | 2020 |
| SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments M Li, Y Yang, G Chen, M Yan, Y Zhang Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024 | 37 | 2024 |
| DAGguise: mitigating memory timing side channels PW Deutsch, Y Yang, T Bourgeat, J Drean, JS Emer, M Yan Proceedings of the 27th ACM International Conference on Architectural …, 2022 | 35 | 2022 |
| Pensieve: Microarchitectural Modeling for Security Evaluation Y Yang, T Bourgeat, S Lau, M Yan Proceedings of the 50th Annual International Symposium on Computer …, 2023 | 32 | 2023 |
| RTL verification for secure speculation using contract shadow logic Q Tan, Y Yang, T Bourgeat, S Malik, M Yan Proceedings of the 30th ACM International Conference on Architectural …, 2025 | 12 | 2025 |
| CaSA: End-to-End Quantitative Security Analysis of Randomly Mapped Caches T Bourgeat, J Drean, Y Yang, L Tsai, JS Emer, M Yan IEEE Design & Test 42 (1), 5-12, 2024 | | 2024 |