About
43
Publications
9,106
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,776
Citations
Introduction
Skills and Expertise
Publications
Publications (43)
Estimating instruction-level throughput is critical for many applications: multimedia, low-latency networking, medical, automotive, avionic, and industrial control systems all rely on tightly calculable and accurate timing bounds of their software. Unfortunately, how long a program may run - or if it may indeed stop at all - cannot be answered in t...
Fault-injection attacks have been proven in the past to be a reliable way of bypassing hardware-based security measures, such as cryptographic hashes, privilege and access permission enforcement, and trusted execution environments. However, traditional fault-injection attacks require physical presence, and hence, were often considered out of scope...
Run-time attacks pose a continuous threat to the security of computer systems. These attacks aim at hijacking the operation of a computer program by subverting its execution at run time. While conventional run-time attacks usually require memory-corruption vulnerabilities in the program, hardware bugs represent an increasingly popular attack vector...
In this paper, we take a deep dive into microarchitectural security from a hardware designer's perspective by reviewing the existing approaches to detect hardware vulnerabilities during the design phase. We show that a protection gap currently exists in practice that leaves chip designs vulnerable to software-based attacks. In particular, existing...
Physically Unclonable Functions (PUFs) are still considered promising technology as building blocks in cryptographic protocols. While most PUFs require dedicated circuitry, recent research leverages DRAM hardware for PUFs due to its intrinsic properties and wide deployment. Recently, a new memory-based PUF was proposed that utilizes the infamous Ro...
Computing platforms are an integral part of today's society: our transportation, media, financial markets, and even our elections already depend on these systems. Consequently, computing platforms are also highly diverse, ranging from embedded devices in planes and cars, to smartphones, laptops, desktop computers, and powerful servers running the c...
Memory-corruption vulnerabilities pose a serious threat to modern computer security. Attackers exploit these vulnerabilities to manipulate code and data of vulnerable applications to generate malicious behavior by means of code-injection and code-reuse attacks. Researchers already demonstrated the power of data-only attacks by disclosing secret dat...
Kernel exploits are commonly used for privilege escalation to take full control over a system, e.g., by means of code-reuse attacks. For this reason modern kernels are hardened with kernel Address Space Layout Randomization (KASLR), which randomizes the start address of the kernel code section at boot time. Hence, the attacker first has to bypass t...
Instruction set randomization (ISR) was initially proposed with the main goal of countering code-injection attacks. However, ISR seems to have lost its appeal since code-injection attacks became less attractive because protection mechanisms such as data execution prevention (DEP) as well as code-reuse attacks became more prevalent. In this paper, w...
Rowhammer is a hardware bug that can be exploited to implement privilege escalation and remote code execution attacks. Previous proposals on rowhammer mitigation either require hardware changes or follow heuristic-based approaches (based on CPU performance counters). To date, there exists no instant protection against rowhammer attacks on legacy sy...
An invasive Fusobacterium infection may originate from an apparent routine pharyngitis and lead to significant distant septic complications. Even without internal jugular thrombosis, the same mechanism of disease exists, and therefore, the same morbidity, prognosis, and treatments are applicable, hence the suitable term incomplete Lemierre syndrome...
Objective:
Reconstruction of traumatic ventral hernias often requires additional techniques to the abdominal wall component separation, such as the use of interpositional reconstruction with an acellular dermal matrix or other mesh to bridge the defect.
Methods:
We have developed a new value termed the "Component Separation Index" to evaluate ve...
Spontaneous and traumatic pneumothoraces are rare conditions found occasionally in athletes. Although generally not life-threatening, these conditions can be fatal if not appropriately diagnosed and managed. Expedient diagnosis depends on a thorough understanding of possible presenting signs and symptoms such as chest pain, dyspnea, and diminished...
In the clinical trial of diaspirin crosslinked hemoglobin (DCLHb), optimal therapy required the immediate enrollment of patients with severe, uncompensated, traumatic hemorrhagic shock. When it was not feasible to obtain prospective consent, an exception to informed consent was used according to FDA regulation 21 CFR 50.24. Objectives: To examine t...
Objectives:
To determine and compare the mortality rates of patients with bilateral versus unilateral femoral fractures and to determine the contribution of the femoral fracture to, and identify risk factors for, such mortality.
Study design:
Retrospective analysis using trauma registry data on consecutive blunt trauma patients with unilateral (...
The role of flexible endoscopy in the diagnosis of esophageal trauma remains undefined. This study evaluates the use of immediate flexible fiberoptic esophagogastroduodenoscopy (EGD) as the primary diagnostic tool for detection of esophageal injury in trauma patients. Flexible EGD was performed on 31 patients for this purpose from August 1991 throu...
A 65-year-old male sustained dorsal dislocation of the long, ring, and small metacarpophalangeal joints and of the long and ring proximal interphalangeal joints. Immediate surgical intervention, including irrigation, debridement, and reduction, were performed. Early range of motion for all joints resulted in functional recovery.
A method of percutaneous tracheostomy (PT) using a tracheostome, which permits insertion of a full-sized cuffed tracheostomy tube, was evaluated in 61 critically ill or injured patients (89% had trauma). Of the 54 trauma patients, 65% had brain injuries, 14% had injuries to the cervical spinal cord, 33% had face or jaw injuries, and 15% had lung in...
During a 9 1/2-year period, 76 pregnant women who sustained blunt trauma were admitted to a level-I trauma center. Fetal outcome was ascertained in 59 patients (78%). Successful delivery was noted in 35 patients (46%). Eight patients (11%) elected to undergo abortion for nonmedical reasons. Sixteen patients (21%) sustained fetal loss, and 17 patien...
A method of percutaneous tracheostomy (PT) using a tracheostome, which permits insertion of a full-sized cuffed tracheostomy tube, was evaluated in 61 critically ill or injured patients (89% had trauma). Of the 54 trauma patients, 65% had brain injuries, 14% had injuries to the cervical spinal cord, 33% had face or jaw injuries, and 15% had lung in...
To examine the effects of associated injuries on death, disability, rehabilitation needs, and cost in patients with blunt traumatic brain injury.
A retrospective case series analysis of 1,709 patients with blunt traumatic brain injury, or 37.2% of 4,590 consecutive blunt trauma patients, was combined with a prospective study of a subset of 202 of t...
Few studies provide data on pregnant trauma patients that can be used to direct management decisions. Therefore, this retrospective study of 79 pregnant patients who were injured and admitted to a trauma center during a 9-year period was conducted to obtain such information. Maternal mortality for these pregnant patients was 10%, which was not diff...
Evaluation of abdominal trauma in pregnant patients presents a number of dilemmas. Few series compare the various modalities available in this situation. The present review characterizes various techniques and their results. The charts of all patients with a secondary diagnosis of pregnancy admitted to a Level I trauma center over a 7 1/2-year peri...
Three hundred forty-three multiple trauma patients with major pelvic ring disruption were studied and subdivided into four major groups by mechanism of injury: antero-posterior compression (APC), lateral compression (LC), vertical shear (VS), and combined mechanical injury (CMI). Acetabular fractures which did not disrupt the pelvic ring were exclu...
Three hundred forty-three multiple trauma patients with major pelvic ring disruption were studied and subdivided into four major groups by mechanism of injury: antero-posterior compression (APC), lateral compression (LC), vertical shear (VS), and combined mechanical injury (CMI). Acetabular fractures which did not disrupt the pelvic ring were exclu...