Tyler K Bletsch

Assistant Professor of the Practice in the Department of Electrical and Computer Engineering

Appointments and Affiliations

  • Assistant Professor of the Practice in the Department of Electrical and Computer Engineering

Contact Information

  • Office Location: 103 Wilkinson Building, Durham, NC 27708
  • Office Phone: (919) 660-5242
  • Email Address: tyler.bletsch@duke.edu
  • Websites:

Education

  • B.S. North Carolina State University, 2004
  • D.Phil. North Carolina State University, 2011

Research Interests

Software security, robotics, project-oriented education, and datacenter efficiency

Courses Taught

  • COMPSCI 250D: Computer Architecture
  • ECE 250D: Computer Architecture
  • ECE 291: Projects in Electrical and Computer Engineering
  • ECE 391: Projects in Electrical and Computer Engineering
  • ECE 392: Projects in Electrical and Computer Engineering
  • ECE 458: Engineering Software for Maintainability
  • ECE 493: Projects in Electrical and Computer Engineering
  • ECE 494: Projects in Electrical and Computer Engineering
  • ECE 496: Special Topics in Electrical and Computer Engineering
  • ECE 560: Computer and Information Security
  • ECE 566: Enterprise Storage Architecture
  • ECE 590: Advanced Topics in Electrical and Computer Engineering
  • ECE 899: Special Readings in Electrical Engineering
  • EGR 391: Projects in Engineering
  • EGR 393: Research Projects in Engineering

In the News

Representative Publications

  • Joardar, B. K., T. K. Bletsch, and K. Chakrabarty. “Learning to Mitigate Rowhammer Attacks.” In Proceedings of the 2022 Design, Automation and Test in Europe Conference and Exhibition, Date 2022, 564–67, 2022. https://doi.org/10.23919/DATE54114.2022.9774703.
  • Bletsch, T., X. Jiang, and V. Freeh. “Mitigating code-reuse attacks with control-flow locking.” In Acm International Conference Proceeding Series, 353–62, 2011. https://doi.org/10.1145/2076732.2076783.
  • Li, J., Z. Wang, T. Bletsch, D. Srinivasan, M. Grace, and X. Jiang. “Comprehensive and efficient protection of kernel control data.” Ieee Transactions on Information Forensics and Security 6, no. 4 (December 1, 2011): 1404–17. https://doi.org/10.1109/TIFS.2011.2159712.
  • Tran, M., M. Etheridge, T. Bletsch, X. Jiang, V. Freeh, and P. Ning. “On the expressiveness of return-into-libc attacks.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6961 LNCS:121–41, 2011. https://doi.org/10.1007/978-3-642-23644-0_7.
  • Bletsch, T., X. Jiang, V. W. Freeh, and Z. Liang. “Jump-oriented programming: A new class of code-reuse attack.” In Proceedings of the 6th International Symposium on Information, Computer and Communications Security, Asiaccs 2011, 30–40, 2011. https://doi.org/10.1145/1966913.1966919.