Artykuły udostępnione publicznie: - Ruby B. LeeWięcej informacji
Dostępne w jakimś miejscu: 25
Last-level cache side-channel attacks are practical
F Liu, Y Yarom, Q Ge, G Heiser, RB Lee
2015 IEEE symposium on security and privacy, 605-622, 2015
Upoważnienia: Australian Research Council
Catalyst: Defeating last-level cache side channel attacks in cloud computing
F Liu, Q Ge, Y Yarom, F Mckeen, C Rozas, G Heiser, RB Lee
2016 IEEE international symposium on high performance computer architecture …, 2016
Upoważnienia: US National Science Foundation, Australian Research Council
Cloudradar: A real-time side-channel attack detection system in clouds
T Zhang, Y Zhang, RB Lee
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
Upoważnienia: US National Science Foundation
Newcache: Secure cache architecture thwarting cache side-channel attacks
F Liu, H Wu, K Mai, RB Lee
IEEE Micro 36 (5), 8-16, 2016
Upoważnienia: US National Science Foundation
Mapping the Intel last-level cache
Y Yarom, Q Ge, F Liu, RB Lee, G Heiser
Cryptology ePrint Archive, 2015
Upoważnienia: Australian Research Council
Attacking and protecting data privacy in edge–cloud collaborative inference systems
Z He, T Zhang, RB Lee
IEEE Internet of Things Journal 8 (12), 9706-9716, 2020
Upoważnienia: US National Science Foundation
How secure is your cache against side-channel attacks?
Z He, RB Lee
Proceedings of the 50th annual IEEE/ACM international symposium on …, 2017
Upoważnienia: US National Science Foundation
Implicit sensor-based authentication of smartphone users with smartwatch
WH Lee, R Lee
Proceedings of the Hardware and Architectural Support for Security and …, 2016
Upoważnienia: US National Science Foundation
Dos attacks on your memory in cloud
T Zhang, Y Zhang, RB Lee
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Upoważnienia: US National Science Foundation
Leveraging hardware transactional memory for cache side-channel defenses
S Chen, F Liu, Z Mi, Y Zhang, RB Lee, H Chen, XF Wang
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
Upoważnienia: US National Science Foundation, US Department of Defense
New models for understanding and reasoning about speculative execution attacks
Z He, G Hu, R Lee
2021 IEEE International Symposium on High-Performance Computer Architecture …, 2021
Upoważnienia: US National Science Foundation
Monitoring and attestation of virtual machine security health in cloud computing
T Zhang, RB Lee
IEEE Micro 36 (5), 28-37, 2016
Upoważnienia: US National Science Foundation
Sok: Hardware defenses against speculative execution attacks
G Hu, Z He, RB Lee
2021 International Symposium on Secure and Private Execution Environment …, 2021
Upoważnienia: US National Science Foundation
Design, implementation and verification of cloud architecture for monitoring a virtual machine's security health
T Zhang, RB Lee
IEEE Transactions on Computers 67 (6), 799-815, 2017
Upoważnienia: US National Science Foundation
Host-based dos attacks and defense in the cloud
T Zhang, RB Lee
Proceedings of the Hardware and Architectural Support for Security and …, 2017
Upoważnienia: US National Science Foundation
A hardware-based technique for efficient implicit information flow tracking
J Shin, H Zhang, J Lee, I Heo, YY Chen, R Lee, Y Paek
2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-7, 2016
Upoważnienia: US National Science Foundation
Record-replay architecture as a general security framework
Y Shalabi, M Yan, N Honarmand, RB Lee, J Torrellas
2018 IEEE International Symposium on High Performance Computer Architecture …, 2018
Upoważnienia: US National Science Foundation
Cloudshield: real-time anomaly detection in the cloud
Z He, G Hu, RB Lee
Proceedings of the Thirteenth ACM Conference on Data and Application …, 2023
Upoważnienia: US National Science Foundation
Practical and Scalable Security Verification of Secure Architectures
T Zhang, J Szefer, RB Lee
Proceedings of the 10th International Workshop on Hardware and Architectural …, 2021
Upoważnienia: US National Science Foundation
Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors.
WH Lee, J Ortiz, B Ko, RB Lee
ICISSP, 139-148, 2018
Upoważnienia: US Department of Defense
Informacje na temat publikacji i finansowania automatycznie określa program komputerowy