Travelled to:
1 × China
1 × United Kingdom
12 × USA
2 × France
3 × Germany
Collaborated with:
V.Bertacco K.Constantinides I.Wagner J.L.Greathouse ∅ W.Arthur A.Pellegrini R.Das S.Shyam D.Blaauw T.N.Mudge D.Gajski S.Svoboda J.Burke J.McDonald S.E.Breach G.S.Sohi B.Mehne H.Xin Y.Luo C.LeBlanc B.Calder C.Krintz S.John Zelalem Birhanu Aweke Salessawi Ferede Yitbarek B.Mammo R.Rodriguez J.Clemons A.Jones R.Perricone S.Savarese S.Phadke H.Kaul D.Sylvester M.Mehrara M.Attariyan S.Lee S.Das M.N.Mneimneh F.A.Aloul C.T.Weaver S.Chatterjee K.A.Sakallah R.Qiao M.Hicks Yossi Oren S.Plaza J.A.Blome B.Zhang S.A.Mahlke M.Orshansky R.Smolinski L.Chen X.Fu S.K.S.Hari J.Jiang S.V.Adve Mark Gallagher Lauren Biernacki Shibo Chen Misiker Tadesse Aga A.Harris Zhixing Xu B.Kasikci S.Malik M.Tiwari
Talks about:
base (7) architectur (4) control (4) test (4) scalabl (3) protect (3) design (3) defect (3) microprocessor (2) softwar (2)
Person: Todd M. Austin
DBLP: Austin:Todd_M=
Contributed to:
Wrote 23 papers:
- CGO-2015-ArthurMDA #control flow
- Getting in control of your control flow with control-data isolation (WA, BM, RD, TMA), pp. 79–90.
- CGO-2013-ArthurMRAB #debugging #named #profiling #scalability #security
- Schnauzer: scalable profiling for likely security bug sites (WA, BM, RR, TMA, VB), p. 11.
- ASPLOS-2012-GreathouseXLA
- A case for unlimited watchpoints (JLG, HX, YL, TMA), pp. 159–172.
- DATE-2012-PellegriniSCFHJAAB #evaluation
- CrashTest’ing SWAT: Accurate, gate-level evaluation of symptom-based resiliency solutions (AP, RS, LC, XF, SKSH, JJ, SVA, TMA, VB), pp. 1106–1109.
- CGO-2011-GreathouseLAB #analysis #data flow #distributed #scalability
- Highly scalable distributed dataflow analysis (JLG, CL, TMA, VB), pp. 277–288.
- DAC-2011-ClemonsJPSA #embedded #feature model #named
- EFFEX: an embedded processor for computer vision based feature extraction (JC, AJ, RP, SS, TMA), pp. 1020–1025.
- DAC-2010-ConstantinidesA #debugging #testing #using
- Using introspective software-based testing for post-silicon debug and repair (KC, TMA), pp. 537–542.
- DAC-2010-GajskiAS #question #synthesis #what
- What input-language is the best choice for high level synthesis (HLS)? (DG, TMA, SS), pp. 857–858.
- DATE-2010-PellegriniBA #authentication
- Fault-based attack of RSA authentication (AP, VB, TMA), pp. 855–860.
- DATE-2007-MehraraASCBA #fault #low cost
- Low-cost protection for SER upsets and silicon defects (MM, MA, SS, KC, VB, TMA), pp. 1146–1151.
- ASPLOS-2006-ShyamCPBA #fault #low cost #pipes and filters
- Ultra low-cost defect protection for microprocessor pipelines (SS, KC, SP, VB, TMA), pp. 73–82.
- DAC-2006-WagnerBA #design #logic
- Shielding against design flaws with field repairable control logic (IW, VB, TMA), pp. 344–347.
- HPCA-2006-ConstantinidesPBZBMAO #architecture #named
- BulletProof: a defect-tolerant CMP switch architecture (KC, SP, JAB, BZ, VB, SAM, TMA, MO), pp. 5–16.
- DAC-2005-WagnerBA #approach #automation #generative #monitoring #named #process #testing
- StressTest: an automatic approach to test generation via activity monitors (IW, VB, TMA), pp. 783–788.
- DATE-2005-KaulSBMA #design #fault
- DVS for On-Chip Bus Designs Based on Timing Error Correction (HK, DS, DB, TNM, TMA), pp. 80–85.
- DAC-2004-Austin #architecture #design #robust
- Designing robust microarchitectures (TMA), p. 78.
- DAC-2004-LeeDBABM #architecture #simulation
- Circuit-aware architectural simulation (SL, SD, VB, TMA, DB, TNM), pp. 305–310.
- DAC-2001-MneimnehAWCSA #hybrid #scalability #verification
- Scalable Hybrid Verification of Complex Microprocessors (MNM, FAA, CTW, SC, KAS, TMA), pp. 41–46.
- ASPLOS-2000-BurkeMA #architecture #encryption #performance #symmetry
- Architectural Support for Fast Symmetric-Key Cryptography (JB, JM, TMA), pp. 178–189.
- ASPLOS-1998-CalderKJA
- Cache-Conscious Data Placement (BC, CK, SJ, TMA), pp. 139–149.
- PLDI-1994-AustinBS #array #detection #fault #performance #pointer
- Efficient Detection of All Pointer and Array Access Errors (TMA, SEB, GSS), pp. 290–301.
- ASPLOS-2016-AwekeYQDHOA #named
- ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks (ZBA, SFY, RQ, RD, MH, YO, TMA), pp. 743–755.
- ASPLOS-2019-GallagherBCAYAH #architecture #named
- Morpheus: A Vulnerability-Tolerant Secure Architecture Based on Ensembles of Moving Target Defenses with Churn (MG, LB, SC, ZBA, SFY, MTA, AH, ZX, BK, VB, SM, MT, TMA), pp. 469–484.