Publications

LeapFrog: The Rowhammer Instruction Skip Attack
Adiletta, A., Tol, C., Derya, K., Sunar, B. & Islam, S. (2024). LeapFrog: The Rowhammer Instruction Skip Attack. arXiv preprint arXiv:2404.07878.
View Publisher Download
Mayhem: Targeted Corruption of Register and Stack Variables
Adiletta, A., Tol, M. C., Doröz, Y., & Sunar, B. (2024, July). Mayhem: Targeted corruption of register and stack variables. In Proceedings of the 19th ACM Asia Conference on Computer and Communications Security (pp. 467-482)
View Publisher Download
Don’t Knock! Rowhammer at the Backdoor of DNN Models
M. Caner Tol, Saad Islam, Andrew J. Adiletta, Berk Sunar, and Ziming Zhang. In Proceeding of The 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network (IEEE IFIP DSN), 2023
View Publisher Download
RowHammer; A Review of the Exploit Used to Access Protected, Inaccessible Memory
Adiletta, A. (2022). : Worcester Polytechnic Institute.
View Publisher Download
Improving the Image Management System at The Postal Museum
Adiletta, A., Rivera, G., & McGurn, W. (2022). : Worcester Polytechnic Institute.
View Publisher Download

Humanities & Social Science

Penicillin: How World War II Affected the Public Reception of The World’s Most Influential Drug
Adiletta, A., (2022). : Worcester Polytechnic Institute.
View Publisher Download
Governance and Dictators; An Independent Study on Political Science Through the Lens of History
Adiletta, A., (2021). : Worcester Polytechnic Institute.
Download
Education and Tariffs; A Battle of Ideas to Influence The Foreign World
Adiletta, A., (2021). : Worcester Polytechnic Institute.
Download