Mohammadkazem (Kazem) Taram
I am an assistant professor in the Department of Computer Science at Purdue University. I received my PhD. degree from the Department of Computer Science and Engineering (CSE) at the University of California San Diego (UCSD) in 2022. My research interests are in computer architecture and computer security. In particular, I am interested in microarchitectural attacks, high-performance mitigations, and architecture support for security and privacy.
I am looking for graduate students. Please contact me if you are interested in my research.
Publications
2024 | Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor Hosein Yavarzadeh, Archit Agarwal, Max Christman, Christina Garman, Daniel Genkin, Andrew Kwong, Daniel Moghimi, Deian Stefan, Kazem Taram, Dean Tullsen Architectural Support for Programming Languages and Operating Systems (ASPLOS), May 2024. [pdf][bibtex][artifact] @inproceedings{yavarzadeh2024pathfinder, title={Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor}, author={Yavarzadeh, Hosein and Agarwal, Archit and Christman, Max and Garman, Christina and Genkin, Daniel and Kwong, Andrew and Moghimi, Daniel and Stefan, Deian and Taram, Kazem and Tullsen, Dean}, booktitle={Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3}, pages={770--784}, year={2024} } |
2023 | NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems Zixuan Wang, Mohammadkazem Taram, Daniel Moghimi, Steven Swanson, Dean Tullsen, Jishen Zhao USENIX Security Symposium (USENIX Security), Aug 2023. [pdf][bibtex][artifact] @inproceedings {usenix23-nvleak, title = {NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems}, author={ Zixuan Wang and Mohammadkazem Taram and Daniel Moghimi and Steven Swanson and Dean Tullsen and Jishen Zhao}, booktitle = {32nd {USENIX} Security Symposium ({USENIX} Security 23)}, year = {2023} } |
Half&Half: Demystifying Intel’s Directional Branch Predictors for Fast, Secure Partitioned Execution Hosein Yavarzadeh, Mohammadkazem Taram, Shravan Narayan, Deian Stefan, Dean Tullsen IIEEE Symposium on Security and Privacy (IEEE S&P), May 2023. [pdf][bibtex][video][code] TBD | |
Going Beyond the Limits of SFI: Flexible Hardware-Assisted In-Process Isolation with HFI Shravan Narayan, Tal Garfinkel, Mohammadkazem Taram, Joey Rudek, Daniel Moghimi, Evan Johnson, Chris Fallin, Anjo Vahldiek-Oberwagner, Michael LeMay, Ravi Sahita, Dean Tullsen, Deian Stefan Architectural Support for Programming Languages and Operating Systems (ASPLOS), March 2023. [pdf][bibtex][video][code] TBD | |
2022 | SecSMT: Securing SMT Processors against Contention-Based Covert Channels Mohammadkazem Taram, Xida Ren, Ashish Venkat, Dean Tullsen, USENIX Security Symposium (USENIX Security), 2022. [pdf (extended)][bibtex][artifact] @inproceedings {usenix22-secsmt, title = {SecSMT: Securing {SMT} Processors against Contention-Based Covert Channels}, author={ Mohammadkazem Taram and Xida Ren and Ashish Venkat and Dean Tullsen}, booktitle = {31st {USENIX} Security Symposium ({USENIX} Security 22)}, year = {2022}, address = {Boston, MA}, month = aug, } |
Mitigating Speculative Execution Attacks via Context-Sensitive Fencing Mohammadkazem Taram, Ashish Venkat, and Dean Tullsen IEEE Design & Test, Special Issue on Top Picks from Hardware and Embedded Security (IEEE D&T), 2022. [pdf][bibtex][video][code] TBD | |
2021 | I See Dead µops: Leaking Secrets via Intel/AMD Micro-Op Caches Xida Ren, Logan Moody, Mohammadkazem Taram, Matthew Jordan, Dean Tullsen, Ashish Venkat, Proceedings of the ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA), Online, June 2021. [pdf][bibtex][slides][video][code] @inproceedings{isca21-uop, title={I See Dead µops: Leaking Secrets via Intel/AMD Micro-Op Caches}, author={Xida Ren and Logan Moody and Mohammadkazem Taram and Matthew Jordan and Dean M. Tullsen and Ashish Venkat}, booktitle={Proceedings of the ACM/IEEE 48th Annual International Symposium on Computer Architecture}, Month = {June}, year={2021} , series = {ISCA '21} } |
Not All Features Are Equal: Discovering Essential Features for Preserving Prediction Privacy Fatemehsadat Mireshghallah, Mohammadkazem Taram, Ali Jalali, Ahmed Taha Elthakeb, Dean Tullsen, and Hadi Esmaeilzadeh Proceedings of the Web Conference (WWW), Ljubljana, Slovenia, April 2021. [pdf][bibtex][video][code] @inproceedings{www2021-cloak, title={Not All Features Are Equal: Discovering Essential Features for Preserving Prediction Privacy}, author={Fatemehsadat Mireshghallah and Mohammadkazem Taram and Ali Jalali and Ahmed Taha Elthakeb and Dean Tullsen and Hadi Esmaeilzadeh}, booktitle={Proceedings of The Web Conference}, Month = {April}, year={2021} , series = {WWW '21} } | |
2020 | Packet Chasing: Spying on Network Packets over a Cache Side-Channel Mohammadkazem Taram, Ashish Venkat, and Dean Tullsen Proceedings of the ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA), Online, May 2020. [pdf][bibtex][slides][video] @inproceedings{isca20-chasing, author = {Taram, Mohammadkazem and Venkat, Ashish and Tullsen, Dean}, title = {Packet Chasing: Spying on Network Packets over a Cache Side-Channel}, year = {2020}, isbn = {9781728146614}, publisher = {IEEE Press}, url = {https://doi.org/10.1109/ISCA45697.2020.00065}, abstract = {This paper presents Packet Chasing, an attack on the network that does not require access to the network, and works regardless of the privilege level of the process receiving the packets. A spy process can easily probe and discover the exact cache location of each buffer used by the network driver. Even more useful, it can discover the exact sequence in which those buffers are used to receive packets. This then enables packet frequency and packet sizes to be monitored through cache side channels. This allows both covert channels between a sender and a remote spy with no access to the network, as well as direct attacks that can identify, among other things, the web page access patterns of a victim on the network. In addition to identifying the potential attack, this work proposes a software-based short-term mitigation as well as a light-weight, adaptive, cache partitioning mitigation that blocks the interference of I/O and CPU requests in the last-level cache.}, booktitle = {Proceedings of the ACM/IEEE 47th Annual International Symposium on Computer Architecture}, pages = {721–734}, numpages = {14}, series = {ISCA '20} } |
Shredder: Learning Noise Distributions to Protect Inference Privacy Fatemehsadat Mireshghallah, Mohammadkazem Taram, Prakash Ramrakhyani, Ali Jalali, Dean Tullsen, and Hadi Esmaeilzadeh Proceedings of the 25th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Online, March 2020. [pdf][bibtex][video][code] @inproceedings{asplos20-shredder, author = {Mireshghallah, Fatemehsadat and Taram, Mohammadkazem and Ramrakhyani, Prakash and Jalali, Ali and Tullsen, Dean and Esmaeilzadeh, Hadi}, title = {Shredder: Learning Noise Distributions to Protect Inference Privacy}, year = {2020}, isbn = {9781450371025}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3373376.3378522}, doi = {10.1145/3373376.3378522}, booktitle = {Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems}, pages = {3–18}, numpages = {16}, keywords = {neural networks, noise, edge computing, privacy, inference, cloud computing, deep learning}, location = {Lausanne, Switzerland}, series = {ASPLOS '20} } | |
Privacy in Deep Learning: A Survey Fatemehsadat Mireshghallah, Mohammadkazem Taram, Praneeth Vepakomma, Abhishek Singh, Ramesh Raskar, and Hadi Esmaeilzadeh ArXiv Preprint, 2020. [pdf][bibtex] @misc{mireshghallah2020privacy, title={Privacy in Deep Learning: A Survey}, author={Fatemehsadat Mireshghallah and Mohammadkazem Taram and Praneeth Vepakomma and Abhishek Singh and Ramesh Raskar and Hadi Esmaeilzadeh}, year={2020}, eprint={2004.12254}, archivePrefix={arXiv}, primaryClass={cs.LG} } | |
2019 | Context-Sensitive Fencing: Securing Speculative Execution via Microcode Customization Mohammadkazem Taram, Ashish Venkat, and Dean Tullsen Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Providence, RI, USA, March 2019. [pdf][bibtex][slides][video][code] @inproceedings{asplos19-csf, author = {Taram, Mohammadkazem and Venkat, Ashish and Tullsen, Dean}, title = {Context-Sensitive Fencing: Securing Speculative Execution via Microcode Customization}, year = {2019}, isbn = {9781450362405}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3297858.3304060}, doi = {10.1145/3297858.3304060}, booktitle = {Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems}, pages = {395–410}, numpages = {16}, keywords = {taint tracking, spectre, secure architectures, speculative execution, side-channel attacks, microcode}, location = {Providence, RI, USA}, series = {ASPLOS '19} } |
Context-Sensitive Decoding: On-Demand Microcode Customization for Security and Energy Management Mohammadkazem Taram, Ashish Venkat, and Dean Tullsen IEEE Micro, Special Issue on the Top Picks from the Computer Architecture Conferences, June 2019. [pdf][bibtex][slides][video][code] @ARTICLE{csd_toppicks19, author={M. {Taram} and A. {Venkat} and D. M. {Tullsen}}, journal={IEEE Micro}, title={Context-Sensitive Decoding: On-Demand Microcode Customization for Security and Energy Management}, year={2019}, volume={39}, number={3}, pages={75-83}, doi={10.1109/MM.2019.2910507}} | |
Fast and Efficient Deployment of Security Defenses via Context Sensitive Decoding Mohammadkazem Taram, Dean M. Tullsen, Ashish Venkat, Houman Homayoun, Sai Manoj MD In Proceedings of the 44th Government Microcircuit Applications and Critical Technology Conference (GOMACTech), March, 2019. [pdf][bibtex][slides][video][code] @inproceedings{csd_gomactech, title={Fast and efficient deployment of security defenses via context sensitive decoding}, author={Taram, Mohammadkazem and Tullsen, Dean and Venkat, Ashish and Sayadi, Hossein and Wang, Han and Manoj, Sai and Homayoun, Houman}, year={2019}, booktitle = {Proceedings of the 44th Government Microcircuit Applications and Critical Technology Conference }, } | |
2018 | Mobilizing the Micro-Ops: Exploiting Context Sensitive Decoding for Security and Energy Efficiency Mohammadkazem Taram, Ashish Venkat, and Dean Tullsen Proceedings of the 45th Annual International Symposium on Computer Architecture (ISCA) June 2019. [pdf][bibtex][slides][video][code] @inproceedings{isca18-csd, author = {Taram, Mohammadkazem and Venkat, Ashish and Tullsen, Dean}, title = {Mobilizing the Micro-Ops: Exploiting Context Sensitive Decoding for Security and Energy Efficiency}, year = {2018}, isbn = {9781538659847}, publisher = {IEEE Press}, url = {https://doi.org/10.1109/ISCA.2018.00058}, doi = {10.1109/ISCA.2018.00058}, booktitle = {Proceedings of the 45th Annual International Symposium on Computer Architecture}, pages = {624–637}, numpages = {14}, keywords = {security, power gating, side channel, microcode}, location = {Los Angeles, California}, series = {ISCA '18} } |
2016 | TooT: an Efficient and Scalable Power-Gating Method for NoC Routers Hossein Farrokhbakht, Mohammadkazem Taram, Behnam Khaleghi, and Shaahin Hessabi. Proceedings of the 10th IEEE/ACM International Symposium on Networks-on-Chip (NOCS), Nara, Japan, Aug 2016. [pdf][bibtex] @INPROCEEDINGS{nocs16-toot, title={TooT: an efficient and scalable power-gating method for NoC routers}, author={Hossein Farrokhbakht and Mohammadkazem Taram and Behnam Khaleghi and Shaahin. Hessabi}, journal={2016 Tenth IEEE/ACM International Symposium on Networks-on-Chip}, year={2016}, pages={1-8}, doi={10.1109/NOCS.2016.7579326}, series = {NOCS '16} } |
A Compile-Time Optimization Method for WCET Reduction in Real-Time Embedded Systems through Block Formation Morteza Mohajjel Kafshdooz, Mohammadkazem Taram, Sepehr Assadi, and Alireza Ejlali ACM Transactions on Architecture and Code Optimization (TACO), Jan 2016. [pdf][bibtex] @article{taco16-wcet, author = {Kafshdooz, Morteza Mohajjel and Taram, Mohammadkazem and Assadi, Sepehr and Ejlali, Alireza}, title = {A Compile-Time Optimization Method for WCET Reduction in Real-Time Embedded Systems through Block Formation}, year = {2016}, issue_date = {January 2016}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, volume = {12}, number = {4}, issn = {1544-3566}, url = {https://doi.org/10.1145/2845083}, doi = {10.1145/2845083}, journal = {ACM Trans. Archit. Code Optim.}, month = jan, articleno = {66}, numpages = {25}, keywords = {WCET, Compile-time optimization, hyperblock} } |
Group
I work with the following top-notch graduate students at Purdue:
Teaching
- Purdue - Computer Security (CS-426), Fall 2023
- Purdue - Microarchitecture Security (CS-593), Spring 2023
- UCSD - Introduction to Computer Architecture (CSE141), Summer Session I 2021
- UCSD - Introduction to Computer Architecture Lab (CSE141L), Summer Session I 2021