Attacking and Protecting Data Privacy in Edge-Cloud Collaborative Inference Systems | 2 | 0.37 | 2021 |
Speculative Execution Attacks and Hardware Defenses | 0 | 0.34 | 2021 |
Actionbert: Leveraging User Actions For Semantic Understanding Of User Interfaces | 0 | 0.34 | 2021 |
HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020. | 0 | 0.34 | 2020 |
Position Paper - Consider Hardware-enhanced Defenses for Rootkit Attacks. | 0 | 0.34 | 2020 |
Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning | 1 | 0.63 | 2019 |
Sensitive-Sample Fingerprinting Of Deep Neural Networks | 0 | 0.34 | 2019 |
Model inversion attacks against collaborative inference | 9 | 0.45 | 2019 |
Design, Implementation and Verification of Cloud Architecture for Monitoring a Virtual Machine's Security Health. | 2 | 0.41 | 2018 |
VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting. | 0 | 0.34 | 2018 |
Time Series Segmentation through Automatic Feature Learning. | 4 | 0.41 | 2018 |
Practical and Scalable Security Verification of Secure Architectures. | 0 | 0.34 | 2018 |
Privacy-preserving Machine Learning through Data Obfuscation. | 1 | 0.35 | 2018 |
Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses. | 4 | 0.37 | 2018 |
Record-Replay Architecture as a General Security Framework | 2 | 0.38 | 2018 |
Implicit Sensor-based Authentication of Smartphone Users with Smartwatch. | 6 | 0.47 | 2017 |
Host-Based Dos Attacks and Defense in the Cloud | 2 | 0.38 | 2017 |
Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning | 5 | 0.43 | 2017 |
How to Quantify Graph De-anonymization Risks. | 1 | 0.36 | 2017 |
Sensor-Based Implicit Authentication of Smartphone Users | 0 | 0.34 | 2017 |
Machine Learning Based DDoS Attack Detection from Source Side in Cloud | 3 | 0.36 | 2017 |
Blind De-anonymization Attacks using Social Networks | 1 | 0.35 | 2017 |
Cloud Server Benchmarks for Performance Evaluation of New Hardware Architecture. | 0 | 0.34 | 2016 |
Newcache: Secure Cache Architecture Thwarting Cache Side-Channel Attacks. | 11 | 0.58 | 2016 |
A hardware-based technique for efficient implicit information flow tracking. | 0 | 0.34 | 2016 |
Monitoring and Attestation of Virtual Machine Security Health in Cloud Computing. | 0 | 0.34 | 2016 |
Rethinking Computers for Cybersecurity | 2 | 0.36 | 2015 |
Disruptive prefetching: impact on side-channel attacks and cache designs | 8 | 0.54 | 2015 |
Can randomized mapping secure instruction caches from side-channel attacks? | 2 | 0.46 | 2015 |
A 32kB secure cache memory with dynamic replacement mapping in 65nm bulk CMOS | 1 | 0.39 | 2015 |
Last-Level Cache Side-Channel Attacks are Practical | 223 | 5.34 | 2015 |
CloudMonatt: an architecture for security health monitoring and attestation of virtual machines in cloud computing | 9 | 0.52 | 2015 |
Random Fill Cache Architecture | 46 | 1.28 | 2014 |
Cyber defenses for physical attacks and insider threats in cloud computing | 0 | 0.34 | 2014 |
BitDeposit: Deterring Attacks and Abuses of Cloud Computing Services through Economic Measures | 4 | 0.89 | 2013 |
Side channel vulnerability metrics: the promise and the pitfalls. | 14 | 0.66 | 2013 |
Security testing of a secure cache design | 13 | 0.76 | 2013 |
Integration of butterfly and inverse butterfly nets in embedded processors: Effects on power saving | 0 | 0.34 | 2012 |
A software-hardware architecture for self-protecting data | 22 | 0.82 | 2012 |
Security verification of hardware-enabled attestation protocols | 0 | 0.34 | 2012 |
Hardware enhanced security | 0 | 0.34 | 2012 |
Physical attack protection with human-secure virtualization in data centers | 5 | 0.47 | 2012 |
Architectural support for hypervisor-secure virtualization | 49 | 1.58 | 2012 |
Eliminating the hypervisor attack surface for a more secure cloud | 64 | 2.03 | 2011 |
A Case for Hardware Protection of Guest VMs from Compromised Hypervisors in Cloud Computing | 11 | 0.60 | 2011 |
Stability and benefits of suboptimal utility maximization | 1 | 0.38 | 2011 |
Rapid single-chip secure processor prototyping on the OpenSPARC FPGA platform | 1 | 0.37 | 2011 |
General-purpose FPGA platform for efficient encryption and hashing | 1 | 0.36 | 2010 |
NoHype: virtualized cloud infrastructure without the virtualization | 117 | 4.30 | 2010 |
Accountability in hosted virtual networks | 11 | 0.90 | 2009 |