Tyler K Bletsch

Assistant Professor of the Practice in the Department of Electrical and Computer Engineering

Tyler joined the faculty at Duke in November 2015 after several years of work in industry with NetApp. He received his Ph.D. from NC State University in 2011, with a research focus on software security. In addition to his work at Duke, he has often been a mentor to FIRST robotics teams. His current professional interests include hardware and software security, robotics, and technology education with an emphasis on project-oriented learning.

Appointments and Affiliations

  • Assistant Professor of the Practice in the Department of Electrical and Computer Engineering
  • Assistant Professor of the Practice of Computer Science

Contact Information

  • Office Location: 103 Wilkinson Building, Durham, NC 27708
  • Office Phone: (919) 660-5242
  • Email Address: tyler.bletsch@duke.edu
  • Websites:

Education

  • B.S. North Carolina State University, 2004
  • D.Phil. North Carolina State University, 2011

Research Interests

Software security, robotics, project-oriented education, and datacenter efficiency

Courses Taught

  • COMPSCI 250D: Computer Architecture
  • COMPSCI 350L: Digital Systems
  • ECE 250D: Computer Architecture
  • ECE 291: Projects in Electrical and Computer Engineering
  • ECE 350L: Digital Systems
  • ECE 391: Projects in Electrical and Computer Engineering
  • ECE 392: Projects in Electrical and Computer Engineering
  • ECE 458: Engineering Software for Maintainability
  • ECE 493: Projects in Electrical and Computer Engineering
  • ECE 494: Projects in Electrical and Computer Engineering
  • ECE 495: Special Topics in Electrical and Computer Engineering
  • ECE 496: Special Topics in Electrical and Computer Engineering
  • ECE 560: Computer and Information Security
  • ECE 568: Engineering Robust Server Software
  • ECE 899: Special Readings in Electrical Engineering
  • EGR 391: Projects in Engineering
  • EGR 393: Research Projects in Engineering

In the News

Representative Publications

  • Joardar, B. K., T. K. Bletsch, and K. Chakrabarty. “Machine Learning-Based Rowhammer Mitigation.” Ieee Transactions on Computer Aided Design of Integrated Circuits and Systems 42, no. 5 (May 1, 2023): 1393–1405. https://doi.org/10.1109/TCAD.2022.3206729.
  • Joardar, B. K., T. K. Bletsch, and K. Chakrabarty. “Learning to Mitigate Rowhammer Attacks.” In Proceedings of the 2022 Design, Automation and Test in Europe Conference and Exhibition, Date 2022, 564–67, 2022. https://doi.org/10.23919/DATE54114.2022.9774703.
  • Bletsch, T., X. Jiang, and V. Freeh. “Mitigating code-reuse attacks with control-flow locking.” In Acm International Conference Proceeding Series, 353–62, 2011. https://doi.org/10.1145/2076732.2076783.
  • Li, J., Z. Wang, T. Bletsch, D. Srinivasan, M. Grace, and X. Jiang. “Comprehensive and efficient protection of kernel control data.” Ieee Transactions on Information Forensics and Security 6, no. 4 (December 1, 2011): 1404–17. https://doi.org/10.1109/TIFS.2011.2159712.
  • Tran, M., M. Etheridge, T. Bletsch, X. Jiang, V. Freeh, and P. Ning. “On the expressiveness of return-into-libc attacks.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6961 LNCS:121–41, 2011. https://doi.org/10.1007/978-3-642-23644-0_7.