Ashish Venkat is an Assistant Professor in the Department of Computer Science at the University of Virginia, where he joined after obtaining a Ph.D. from UC San Diego. His research explores novel and cross-disciplinary hardware and software techniques to design secure systems that offer robust exploit mitigations, while maintaining high levels of performance, energy efficiency, and programmability. He is the recipient of NSF’s prestigious CAREER and CRII awards. His work has been published at top-tier venues such as ISCA, MICRO, ASPLOS, HPCA, IEEE Security and Privacy, and USENIX Security, and has received funding from NSF, DARPA, SRC, and Intel. His work has been recognized as an IEEE Micro Top Pick among all top-tier Computer Architecture Conference papers published in 2019, IEEE Design & Test Top Pick (twice) among all Hardware and Embedded Security papers published in Computer Architecture, Computer Security, and VLSI CAD conferences held in the last six years (in 2020 and 2021), best paper nominee at DATE 2023, and as the runner-up of the HPCA Best Paper Award in 2019. His dissertation research has been successfully ported and transferred to the Cloud Platforms division of the IBM Haifa Research Lab.
Research Interests
Computer Architecture
Compilers
Computer Security
Selected Publications
Ceviche: Capability-Enhanced Virtualization of Caches. In Proceedings of the 46th IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, May 2025
[Acceptance Rate: 14%]
Arnabjyoti Kalita, Yilong Yang, Alenkruth Krishnan Murali, Ashish Venkat
Hardware Trojan Threats in eNVM Neuromorphic Devices. In Proceedings of the 26th Design, Automation and Test in Europe Conference (DATE 2023), Antwerp, Beliguim, April, 2023 [Acceptance Rate: 25%, Best Paper Nominee].
Lingxi Wu, Rahul Sreekumar, Rasool Sharifi, Kevin Skadron, Mircea Stan, Ashish Venkat
Speculative Code Compaction: Eliminating Dead Code via Speculative Microcode Transformations. In Proceedings of the 55th ACM/IEEE International Symposium on Microarchitecture (MICRO 2022), Chicago, IL, October, 2022. [Acceptance Rate: 23%]
Logan Moody, Wei Qi, Abdolrasoul Sharifi, Layne Berry, Joey Rudek, Jayesh Gaur, Jeff Parkhurst, Sreenivas Subramoney, Kevin Skadron, Ashish Venkat,
I See Dead µops: Leaking Secrets via Intel/AMD Micro-Op Caches. In Proceedings of the 48th ACM/IEEE International Symposium on Computer Architecture (ISCA), June, 2021. [ Acceptance rate: 19% ]
Xida Ren, Logan Moody, Mohammadkazem Taram, Matthew Jordan, Dean M. Tullsen, Ashish Venkat
Sieve: Scalable In-situ DRAM-based Accelerator Designs for Massively Parallel k-mer Matching. In Proceedings of the 48th ACM/IEEE International Symposium on Computer Architecture (ISCA), June, 2021. [ Acceptance rate: 19% ]
Lingxi Wu, Rasool Sharifi, Marzieh Lenjani, Kevin Skadron, Ashish Venkat
CHEx86: Context-Sensitive Enforcement of Memory Safety via Microcode-Enabled Capabilities. In Proceedings of the 47th ACM International Symposium on Computer Architecture (ISCA), June, 2020. [Acceptance Rate: 18%]
Rasool Sharifi and Ashish Venkat
Courses Taught
CS 6501/4501 - Hardware Security
Fall 2018, Fall 2020, Spring 2023, Spring 2024
CS 3330 - Undergraduate Computer Architecture
Spring 2019, Spring 2020, Spring 2021, Spring 2022
CS 6354 - Graduate Computer Architecture
Fall 2019, Fall 2021, Fall 2022
Awards
UVA Research Achievement Award 2023 (National Recognition Category)
Recognized for outstanding research and scholarship at UVA’s university-wide Fifth Annual Research Achievement Awards
ISCA Prolific Author of the Decade 2013-2022
List of prolific authors at ISCA for the decade 2013-2022, put together as part of the retrospective on Fifty Years of ISCA!
NSF CAREER Award
2023
DATE Best Paper Nomination
2023
Top Pick in Hardware and Embedded Security
2020 and 2021
IEEE Micro Top Pick
2019
HPCA Best Paper Runner-Up
2019
NSF CRII Award
2018
Featured Grants & Projects
DARPA/I20 HERCULES -- Hardware-Enhanced Resilient Compartmentalization and Program Analysis for Upgraded Legacy Environment Security
$4.9M (main PI with UVA as Prime)
The goal of this project is to provide a holistic compartmentalization solution, following the principle of least privilege, that spans multiple layers of the computing stack. It integrates several novel solutions, including sound and precise static analysis methods, dynamic tracing with high coverage, principal modeling, effective source code annotations, automated code restructuring, low-level compiler transformations, and microarchitectural design mechanisms and optimizations.
NSF CAREER: Enabling Robust and Adaptive Architectures through a Decoupled Security-Centric Hardware/Software Stack
$510,000 (Sole-PI)
The growing complexity in modern systems has placed substantial limits on our ability to comprehensively assess threats and deploy timely mitigations. According to Google's Project Zero, a new exploit is discovered in the wild every 17 days, although it takes an average of 15 days across all vendors to patch a vulnerability, highlighting the inability of existing solutions to scale with the rapidly evolving threat landscape. This project takes a radically new approach by developing a holistic security-centric hardware/software stack that is decoupled from the Instruction Set Architecture (ISA), so as to empower software to dynamically push expressive security policies to hardware, where they can be transparently and efficiently enforced on-demand and in-the-field through novel hardware design mechanisms, without the need for recompilation, redeployment, and frequent hardware upgrades. This work is expected to significantly enhance robustness, versatility, flexibility, and adaptability of modern architectures in the range and types of exploits they can mitigate, while simultaneously minimizing both the time to mitigation and the cost of deployment. This project will also address the urgent need to boost the nation's cybersecurity workforce through (a) curriculum development and ethical hacking workshops targeted at high school, college, and professional students, (b) development of community research infrastructure and evaluation testbeds for rapid assessment of security policies, and (c) research mentorship of undergraduate and underrepresented students on security-related projects. This project entails three synergistic research thrusts that together enable a holistic full system across-the-stack solution for timely mitigation of exploits. The first thrust will develop a decoupled security-centric hardware/software interface to allow software to capture interactions and relationships among the different subjects and objects in the system and specify an expressive set of security policies in the form of logic formulas, to mitigate a wide range of hardware and software attacks ranging from memory and type safety to transient execution attacks. The second thrust will develop novel hardware design mechanisms and microcode primitives to evaluate and enforce the security policies specified in software, while maintaining high levels of performance with minimal impact on power and area. The third thrust will develop innovative hardware-based attribute tracking mechanisms to transparently track the flow of high-level software attributes, during execution, to enhance the effectiveness of the underlying hardware enforcement mechanisms.
NSF/Intel FoMR: Speculative Super-optimization: Boosting Performance via Speculation-Driven Dynamic Binary Optimization
$416,000 (main PI)
Modern processors are characterized by increasing core counts, and yet, a substantial chunk of software applications is inherently sequential. Although modern compilers feature sophisticated optimizations, significant wasteful computation still persists due to computational patterns that are unpredictable at compile-time. This project explores techniques to deploy aggressive speculative dynamic binary optimizations within the processor, enabling continuous optimization of inherently sequential code. This work addresses a pressing need for systems that can aggressively and yet seamlessly super-optimize machine code, adapting to the dynamic execution environment, and thereby speed up inherently sequential applications.
NSF: Collaborative Research: PPoSS: LARGE: Co- designing Hardware, Software, and Algorithms to Enable Extreme-Scale Machine Learning Systems
$3M (co-PI)
We propose to build a co-designed framework of hardware, software, and algorithms to enable extreme-scale machine learning computing and systems, named XSCALE4ML, to support the new generation of algorithms, systems, and tools required to achieve deep integration of extreme-scale machine learning computing across all layers of the software and hardware stack.
NSF:Collaborative Research: CCRI: New: A Scalable Hardware and Software Environment Enabling Secure Multi-party Learning
$1.6M (co-PI)
The goal of this project is to establish a scalable and trusted hardware/software environment which supports collaborative machine learning, where parties can share their data with each other with different degrees of privacy control via a centralized server and are able to compute with each other's data, by either directly sharing their data with the server or not directly sharing their data but their model parameters with the server to collaboratively derive a solution with other parties.
SRC CADT: ProxyVM: A Scalable and Re-Targetable Compiler Framework for Privacy-Preserving Machine Learning
$297,000 (main PI)
This research proposes ProxyVM, a scalable and a retargetable compiler framework that enables privacy-aware synthetic workload generation with high performance predictability. The key to ProxyVM is a privacy-preserving performance outline, a rich intermediate representation akin to TensorFlow’s computation graph, generated by a performance characterizing front-end deployed at the customer site, allowing the performance characteristics of a sensitive workload to be seamlessly shared with hardware vendors, with the guarantee that proprietary algorithms and sensitive user data remain invulnerable to disclosure. This privacy-preserving performance outline is designed for rich expressiveness allowing workloads to be characterized as a set of computational chunks or algorithms of varying granularity, parameterizable by input data attributes that are potentially deidentified/obfuscated via differential privacy techniques. ProxyVM’s backends, deployed at the hardware manufacturer’s end, may then leverage this outline to automatically generate synthetic workloads that retain the performance characteristics of the real workload and further guide application-specific hardware design.
NSF:CRII:SaTC: Mitigating Software-Based Microarchitectural Attacks via Secure Microcode Customization
$174,996 (main PI)
Modern high-performance processors implement complex microarchitectural optimizations involving speculative execution which has recently been shown to be vulnerable to a type of malicious attack called Spectre. This project will investigate a microarchitectural solution framework to secure against such attacks. This framework, called context-sensitive fencing, will seek to automatically track and detect malicious execution patterns dynamically to trigger defense code without programmer intervention and with minimal impact on processor performance.
DARPA:MTO: Mobilizing the Micro-Ops: Securing Processor Architectures via Context-Sensitive Decoding
$1.1M (subcontractor)
This project explores techniques that combine a low-cost, configurable, transparent defense mechanism (based on context-sensitive decoding) with an effective learning-based detection model, which allows us to minimize the cost of secure computation by constantly adapting the level of defense, and targeting the type of defense, to the current execution characteristics and the current likelihood and type of attack.