Publications

My research sits at the intersection of computer architecture security and microarchitectural performance, with a focus on how aggressive front-end optimizations in modern processors interact with security boundaries. I study both how these optimizations create exploitable timing side channels, and how speculative techniques can be harnessed to improve processor efficiency.

55th International Symposium on Microarchitecture (MICRO)  · 

Modern processors frequently execute micro-operations (µops) whose results are never consumed—dead µops that waste execution resources without contributing to program output. We propose Speculative Code Compaction (SCC), a microarchitectural technique that speculatively identifies and eliminates dead µops using dynamic dataflow analysis. SCC reduces back-end pressure and improves instruction throughput transparently to software, achieving meaningful speedups across a range of real-world workloads.

48th International Symposium on Computer Architecture (ISCA)  · 

Modern processors cache decoded micro-operations (µops) in a µop cache to skip redundant instruction fetch and decode. We show that the µop cache introduces a timing side channel that can be exploited by a malicious actor to leak sensitive information across security boundaries. We demonstrate end-to-end Spectre-style attacks on Intel and AMD processors—leaking data across process and VM boundaries—and evaluate potential hardware and software mitigations.