default search action
Mengjia Yan 0001
Person information
- affiliation: Massachusetts Institute of Technology, Cambridge, MA, USA
- affiliation (PhD): University of Illinois at Urbana-Champaign, IL, USA
- affiliation (former): Zhejiang University, College of Computer Science and Technology, Hangzhou, China
Other persons with the same name
- Mengjia Yan 0002 — Communication University of China, Beijing, China
- Mengjia Yan 0003 — Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore
- Mengjia Yan 0004 — Horizon Robotics
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Mengjia Yan, Thomas Bourgeat, Sharad Malik:
Formal Verification for Secure Processors: A Guide for Computer Architects. Computer 57(10): 138-143 (2024) - [c26]Mengyuan Li, Yuheng Yang, Guoxing Chen, Mengjia Yan, Yinqian Zhang:
SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments. AsiaCCS 2024 - [c25]Peter W. Deutsch, Vincent Quentin Ulitzsch, Sudhanva Gurumurthi, Vilas Sridharan, Joel S. Emer, Mengjia Yan:
DelayAVF: Calculating Architectural Vulnerability Factors for Delay Faults. MICRO 2024: 231-245 - [i6]Mengyuan Li, Shashvat Srivastava, Mengjia Yan:
Bridge the Future: High-Performance Networks in Confidential VMs without Trusted I/O devices. CoRR abs/2403.03360 (2024) - [i5]Qinhan Tan, Yuheng Yang, Thomas Bourgeat, Sharad Malik, Mengjia Yan:
RTL Verification for Secure Speculation Using Contract Shadow Logic. CoRR abs/2407.12232 (2024) - [i4]Shixuan Zhao, Mengyuan Li, Mengjia Yan, Zhiqiang Lin:
Ditto: Elastic Confidential VMs with Secure and Dynamic CPU Scaling. CoRR abs/2409.15542 (2024) - 2023
- [j5]Joseph Ravichandran, Weon Taek Na, Jay Lang, Mengjia Yan:
PACMAN: Attacking ARM Pointer Authentication With Speculative Execution. IEEE Micro 43(4): 11-18 (2023) - [j4]Jack Cook, Jules Drean, Jonathan Behrens, Mengjia Yan:
There's Always a Bigger Fish: A Clarifying Analysis of a Machine-Learning-Assisted Side-Channel Attack. IEEE Micro 43(4): 28-36 (2023) - [c24]William Liu, Joseph Ravichandran, Mengjia Yan:
EntryBleed: A Universal KASLR Bypass against KPTI on Linux. HASP@MICRO 2023: 10-18 - [c23]Peter W. Deutsch, Weon Taek Na, Thomas Bourgeat, Joel S. Emer, Mengjia Yan:
Metior: A Comprehensive Model to Evaluate Obfuscating Side-Channel Defense Schemes. ISCA 2023: 38:1-38:16 - [c22]Yuheng Yang, Thomas Bourgeat, Stella Lau, Mengjia Yan:
Pensieve: Microarchitectural Modeling for Security Evaluation. ISCA 2023: 59:1-59:15 - [c21]Kyungmi Lee, Mengjia Yan, Joel S. Emer, Anantha P. Chandrakasan:
SecureLoop: Design Space Exploration of Secure DNN Accelerators. MICRO 2023: 194-208 - [i3]Weon Taek Na, Joel S. Emer, Mengjia Yan:
Penetrating Shields: A Systematic Analysis of Memory Corruption Mitigations in the Spectre Era. CoRR abs/2309.04119 (2023) - 2022
- [c20]Peter W. Deutsch, Yuheng Yang, Thomas Bourgeat, Jules Drean, Joel S. Emer, Mengjia Yan:
DAGguise: mitigating memory timing side channels. ASPLOS 2022: 329-343 - [c19]Jack Cook, Jules Drean, Jonathan Behrens, Mengjia Yan:
There's always a bigger fish: a clarifying analysis of a machine-learning-assisted side-channel attack. ISCA 2022: 204-217 - [c18]Joseph Ravichandran, Weon Taek Na, Jay Lang, Mengjia Yan:
PACMAN: attacking ARM pointer authentication with speculative execution. ISCA 2022: 685-698 - [c17]Miles Dai, Riccardo Paccagnella, Miguel Gomez-Garcia, John D. McCalpin, Mengjia Yan:
Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects. USENIX Security Symposium 2022: 2857-2874 - 2021
- [j3]Jiyong Yu, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas, Christopher W. Fletcher:
Speculative taint tracking (STT): a comprehensive protection for speculatively accessed data. Commun. ACM 64(12): 105-112 (2021) - [c16]Zhenxiao Qi, Qian Feng, Yueqiang Cheng, Mengjia Yan, Peng Li, Heng Yin, Tao Wei:
SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets. NDSS 2021 - 2020
- [j2]Jiyong Yu, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas, Christopher W. Fletcher:
Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data. IEEE Micro 40(3): 81-90 (2020) - [j1]Dimitrios Skarlatos, Mengjia Yan, Bhargava Gopireddy, Read Sprabery, Josep Torrellas, Christopher W. Fletcher:
MicroScope: Enabling Microarchitectural Replay Attacks. IEEE Micro 40(3): 91-98 (2020) - [c15]Thomas Bourgeat, Jules Drean, Yuheng Yang, Lillian Tsai, Joel S. Emer, Mengjia Yan:
CaSA: End-to-end Quantitative Security Analysis of Randomly Mapped Caches. MICRO 2020: 1110-1123 - [c14]Zirui Neil Zhao, Houxiang Ji, Mengjia Yan, Jiyong Yu, Christopher W. Fletcher, Adam Morrison, Darko Marinov, Josep Torrellas:
Speculation Invariance (InvarSpec): Faster Safe Execution Through Program Analysis. MICRO 2020: 1138-1152 - [c13]Mengjia Yan, Christopher W. Fletcher, Josep Torrellas:
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures. USENIX Security Symposium 2020: 2003-2020
2010 – 2019
- 2019
- [b1]Mengjia Yan:
Cache-based side channels: Modern attacks and defenses. University of Illinois Urbana-Champaign, USA, 2019 - [c12]Dimitrios Skarlatos, Mengjia Yan, Bhargava Gopireddy, Read Sprabery, Josep Torrellas, Christopher W. Fletcher:
MicroScope: enabling microarchitectural replay attacks. ISCA 2019: 318-331 - [c11]Mengjia Yan, Jen-Yang Wen, Christopher W. Fletcher, Josep Torrellas:
SecDir: a secure directory to defeat directory side-channel attacks. ISCA 2019: 332-345 - [c10]Mengjia Yan:
Research problems and opportunities in NoC-based side channel attacks and defenses: lessons learned from cache-based side channels. NoCArc@MICRO 2019: 5:1 - [c9]Jiyong Yu, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas, Christopher W. Fletcher:
Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data. MICRO 2019: 954-968 - [c8]Mengjia Yan, Jiho Choi, Dimitrios Skarlatos, Adam Morrison, Christopher W. Fletcher, Josep Torrellas:
InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy (Corrigendum). MICRO 2019: 1076 - [c7]Mengjia Yan, Read Sprabery, Bhargava Gopireddy, Christopher W. Fletcher, Roy H. Campbell, Josep Torrellas:
Attack Directories, Not Caches: Side Channel Attacks in a Non-Inclusive World. IEEE Symposium on Security and Privacy 2019: 888-904 - 2018
- [c6]Yasser Shalabi, Mengjia Yan, Nima Honarmand, Ruby B. Lee, Josep Torrellas:
Record-Replay Architecture as a General Security Framework. HPCA 2018: 180-193 - [c5]Kartik Hegde, Jiyong Yu, Rohit Agrawal, Mengjia Yan, Michael Pellauer, Christopher W. Fletcher:
UCNN: Exploiting Computational Reuse in Deep Neural Networks via Weight Repetition. ISCA 2018: 674-687 - [c4]Mengjia Yan, Jiho Choi, Dimitrios Skarlatos, Adam Morrison, Christopher W. Fletcher, Josep Torrellas:
InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy. MICRO 2018: 428-441 - [i2]Kartik Hegde, Jiyong Yu, Rohit Agrawal, Mengjia Yan, Michael Pellauer, Christopher W. Fletcher:
UCNN: Exploiting Computational Reuse in Deep Neural Networks via Weight Repetition. CoRR abs/1804.06508 (2018) - [i1]Mengjia Yan, Christopher W. Fletcher, Josep Torrellas:
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures. CoRR abs/1808.04761 (2018) - 2017
- [c3]Mengjia Yan, Bhargava Gopireddy, Thomas Shull, Josep Torrellas:
Secure Hierarchy-Aware Cache Replacement Policy (SHARP): Defending Against Cache-Based Side Channel Attacks. ISCA 2017: 347-360 - 2016
- [c2]Mengjia Yan, Yasser Shalabi, Josep Torrellas:
ReplayConfusion: Detecting cache-based covert channel attacks using record and replay. MICRO 2016: 39:1-39:14 - 2013
- [c1]Mengjia Yan, Weiwei Fu, Chao Wang, Tianzhou Chen, Li Liu:
Agent-Based Traffic Merging in Network-on-Chip. IPDPS Workshops 2013: 649-658
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 02:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint