• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1980 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2021

    New Models for Understanding and Reasoning about Speculative Execution Attacks

    He, Z., Hu, G. & Lee, R., Feb 2021, Proceeding - 27th IEEE International Symposium on High Performance Computer Architecture, HPCA 2021. IEEE Computer Society, p. 40-53 14 p. 9407076. (Proceedings - International Symposium on High-Performance Computer Architecture; vol. 2021-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    Model inversion attacks against collaborative inference

    He, Z., Zhang, T. & Lee, R. B., Dec 9 2019, Proceedings - 35th Annual Computer Security Applications Conference, ACSAC 2019. Association for Computing Machinery, p. 148-162 15 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Power-grid controller anomaly detection with enhanced temporal deep learning

    He, Z., Raghavan, A., Hu, G., Chai, S. & Lee, R., Aug 2019, Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. Institute of Electrical and Electronics Engineers Inc., p. 160-167 8 p. 8887367. (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Sensitive-sample fingerprinting of deep neural networks

    He, Z., Zhang, T. & Lee, R., Jun 2019, Proceedings - 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2019. IEEE Computer Society, p. 4724-4732 9 p. 8953972. (Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition; vol. 2019-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • 2018

    Analyzing cache side channels using deep neural networks

    Zhang, T., Zhang, Y. & Lee, R. B., Dec 3 2018, ACM International Conference Proceeding Series. Association for Computing Machinery, p. 174-186 13 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • How to quantify graph De-anonymization risks

    Lee, W. H., Liu, C., Ji, S., Mittal, P. & Lee, R. B., 2018, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Mori, P., Camp, O. & Furnell, S. (eds.). Springer Verlag, p. 84-104 21 p. (Communications in Computer and Information Science; vol. 867).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Inferring smartphone users’ handwritten patterns by using motion sensors

    Lee, W. H., Ortiz, J., Ko, B. & Lee, R., 2018, ICISSP 2018 - Proceedings of the 4th International Conference on Information Systems Security and Privacy. Mori, P., Furnell, S. & Camp, O. (eds.). SciTePress, p. 139-148 10 p. (ICISSP 2018 - Proceedings of the 4th International Conference on Information Systems Security and Privacy; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Scopus citations
  • Leveraging hardware transactional memory for cache side-channel defenses

    Chen, S., Liu, F., Mi, Z., Zhang, Y., Lee, R. B., Chen, H. & Wang, X. F., May 29 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 601-608 8 p. (ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Record-Replay Architecture as a General Security Framework

    Shalabi, Y., Yan, M., Honarmand, N., Lee, R. B. & Torrellas, J., Mar 27 2018, Proceedings - 24th IEEE International Symposium on High Performance Computer Architecture, HPCA 2018. IEEE Computer Society, p. 180-193 14 p. (Proceedings - International Symposium on High-Performance Computer Architecture; vol. 2018-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • 2017

    Blind De-anonymization Attacks using Social Networks

    Lee, W. H., Ji, S., Liu, C., Mittal, P. & Lee, R. B., Oct 30 2017, WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 1-4 4 p. (WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • CloudShelter: Protecting virtual machines' memory resource availability in clouds

    Zhang, T., Xu, Y., Bao, Y. & Lee, R. B., Nov 22 2017, Proceedings - 35th IEEE International Conference on Computer Design, ICCD 2017. Institute of Electrical and Electronics Engineers Inc., p. 557-564 8 p. 8119270. (Proceedings - 35th IEEE International Conference on Computer Design, ICCD 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • DoS attacks on your memory in the cloud

    Zhang, T., Zhang, Y. & Lee, R. B., Apr 2 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 253-265 13 p. (ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Scopus citations
  • Host-based DoS attacks and defense in the cloud

    Zhang, T. & Lee, R. B., Jun 25 2017, Hardware and Architectural Support for Security and Privacy, HASP 2017. Association for Computing Machinery, 3092630. (ACM International Conference Proceeding Series; vol. Part F128533).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • How secure is your cache against side-channel attacks?

    He, Z. & Lee, R. B., Oct 14 2017, MICRO 2017 - 50th Annual IEEE/ACM International Symposium on Microarchitecture Proceedings. IEEE Computer Society, p. 341-353 13 p. (Proceedings of the Annual International Symposium on Microarchitecture, MICRO; vol. Part F131207).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    33 Scopus citations
  • Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning

    Lee, W. H. & Lee, R. B., Aug 30 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 297-308 12 p. 8023131. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Scopus citations
  • Machine Learning Based DDoS Attack Detection from Source Side in Cloud

    He, Z., Zhang, T. & Lee, R. B., Jul 20 2017, Proceedings - 4th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2017 and 3rd IEEE International Conference of Scalable and Smart Cloud, SSC 2017. Qiu, M. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 114-120 7 p. 7987186. (Proceedings - 4th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2017 and 3rd IEEE International Conference of Scalable and Smart Cloud, SSC 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    58 Scopus citations
  • Quantification of de-anonymization risks in social networks

    Lee, W. H., Liu, C., Ji, S., Mittal, P. & Lee, R., 2017, ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Mori, P., Furnell, S. & Camp, O. (eds.). SciTePress, p. 126-135 10 p. (ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Scopus citations
  • Secure Pick Up: Implicit authentication when you start using the smartphone

    Lee, W. H., Liu, X., Shen, Y., Jin, H. & Lee, R. B-L., Jun 7 2017, SACMAT 2017 - Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 67-78 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT; vol. Part F128644).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Scopus citations
  • Sensor-Based Implicit Authentication of Smartphone Users

    Lee, W. H. & Lee, R. B., Aug 30 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 309-320 12 p. 8023132. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • 2016

    A 32kB secure cache memory with dynamic replacement mapping in 65nm bulk CMOS

    Erbagci, B., Liu, F., Cakir, C., Akkaya, N. E. C., Lee, R. B-L. & Mai, K., Jan 19 2016, 2015 IEEE Asian Solid-State Circuits Conference, A-SSCC 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7387501. (2015 IEEE Asian Solid-State Circuits Conference, A-SSCC 2015 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • A hardware-based technique for efficient implicit information flow tracking

    Shin, J., Zhang, H., Lee, J., Heo, I., Chen, Y. Y., Lee, R. & Paek, Y., Nov 7 2016, 2016 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2016. Institute of Electrical and Electronics Engineers Inc., 2966991. (IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD; vol. 07-10-November-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • CATalyst: Defeating last-level cache side channel attacks in cloud computing

    Liu, F., Ge, Q., Yarom, Y., McKeen, F., Rozas, C., Heiser, G. & Lee, R. B-L., Apr 1 2016, Proceedings of the 2016 IEEE International Symposium on High-Performance Computer Architecture, HPCA 2016. IEEE Computer Society, p. 406-418 13 p. 7446082. (Proceedings - International Symposium on High-Performance Computer Architecture; vol. 2016-April).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    191 Scopus citations
  • Cloudradar: A real-time side-channel attack detection system in clouds

    Zhang, T., Zhang, Y. & Lee, R. B., 2016, Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Dacier, M., Monrose, F., Blanc, G. & Garcia-Alfaro, J. (eds.). Springer Verlag, p. 118-140 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    75 Scopus citations
  • HotChips security tutorial

    Lee, R. B., Chandra, V., Van Doorn, L. & Durham, D., May 25 2016, 2014 IEEE Hot Chips 26 Symposium, HCS 2014. Institute of Electrical and Electronics Engineers Inc., 7478794. (2014 IEEE Hot Chips 26 Symposium, HCS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Implicit sensor-based authentication of smartphone users with smartwatch

    Lee, W. H. & Lee, R., Jun 18 2016, Hardware and Architectural Support for Security and Privacy, HASP 2016. Association for Computing Machinery, 2948627. (ACM International Conference Proceeding Series; vol. 18-June-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Security basics

    Lee, R. B-L., May 25 2016, 2014 IEEE Hot Chips 26 Symposium, HCS 2014. Institute of Electrical and Electronics Engineers Inc., 7478795

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • University research in hardware security

    Lee, R. B., May 25 2016, 2014 IEEE Hot Chips 26 Symposium, HCS 2014. Institute of Electrical and Electronics Engineers Inc., 7478799. (2014 IEEE Hot Chips 26 Symposium, HCS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2015

    Can randomized mapping secure instruction caches from side-channel attacks?

    Liu, F., Wu, H. & Lee, R. B., Jun 14 2015, Hardware and Architectural Support for Security and Privacy, HASP 2015. Association for Computing Machinery, a4. (ACM International Conference Proceeding Series; vol. 14-June-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • CloudMonatt: An architecture for security health monitoring and attestation of virtual machines in cloud computing

    Zhang, T. & Lee, R. B., Jun 13 2015, ISCA 2015 - 42nd Annual International Symposium on Computer Architecture, Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 362-374 13 p. (Proceedings - International Symposium on Computer Architecture; vol. 13-17-June-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • Disruptive prefetching: Impact on side-channel attacks and cache designs

    Fuchs, A. & Lee, R. B., May 26 2015, SYSTOR 2015 - Proceedings of the 8th ACM International Systems and Storage Conference. Association for Computing Machinery, Inc, 2757672. (SYSTOR 2015 - Proceedings of the 8th ACM International Systems and Storage Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • Implicit authentication for smartphone security

    Lee, W. H. & Lee, R. B., 2015, 1st International Conference on Information Systems Security and Privacy, ICISSP 2015. Camp, O., Aïmeur, E., Weippl, E. & Bidan, C. (eds.). Springer Verlag, p. 160-176 17 p. (Communications in Computer and Information Science; vol. 576).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Last-level cache side-channel attacks are practical

    Liu, F., Yarom, Y., Ge, Q., Heiser, G. & Lee, R. B-L., Jul 17 2015, Proceedings - 2015 IEEE Symposium on Security and Privacy, SP 2015. Institute of Electrical and Electronics Engineers Inc., p. 605-622 18 p. 7163050. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2015-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    466 Scopus citations
  • Multi-sensor authentication to improve smartphone security

    Lee, W. H. & Lee, R. B., 2015, ICISSP 2015 - 1st International Conference on Information Systems Security and Privacy, Proceedings. Camp, O., Weippl, E., Bidan, C. & Aimeur, E. (eds.). SciTePress, p. 270-280 11 p. (ICISSP 2015 - 1st International Conference on Information Systems Security and Privacy, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    64 Scopus citations
  • Random Fill Cache Architecture

    Liu, F. & Lee, R. B-L., Jan 15 2015, Proceedings - 47th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2014. January ed. IEEE Computer Society, p. 203-215 13 p. 7011389. (Proceedings of the Annual International Symposium on Microarchitecture, MICRO; vol. 2015-January, no. January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    75 Scopus citations
  • 2014

    Cyber defenses for physical attacks and insider threats in cloud computing

    Szefer, J., Jamkhedkar, P., Perez-Botero, D. & Lee, R. B., Jun 4 2014, ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, Inc, p. 519-524 6 p. (ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • 2013

    Characterizing hypervisor vulnerabilities in cloud computing servers

    Perez-Botero, D., Szefer, J. & Lee, R. B., Jun 7 2013, Cloud Computing 2013 - Proceedings of the 2013 International Workshop on Security in Cloud Computing. p. 3-10 8 p. (Cloud Computing 2013 - Proceedings of the 2013 International Workshop on Security in Cloud Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    128 Scopus citations
  • Security testing of a secure cache design

    Liu, F. & Lee, R. B., Jan 1 2013, Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2013. Association for Computing Machinery, 3. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Side channel vulnerability metrics: The promise and the pitfalls

    Zhang, T., Chen, S., Liu, F. & Lee, R. B-L., Aug 26 2013, Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2013. 2. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2012

    Architectural support for hypervisor-secure virtualization

    Szefer, J. & Lee, R. B-L., Mar 28 2012, ASPLOS XVII - 17th International Conference on Architectural Support for Programming Languages and Operating Systems. p. 437-449 13 p. (International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    96 Scopus citations
  • A software-hardware architecture for self-protecting data

    Chen, Y. Y., Jamkhedkar, P. A. & Lee, R. B., Nov 26 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 14-27 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Scopus citations
  • Building technologies that help cyber-defense: Hardware-enabled trust

    Vishik, C., Lee, R. B. & Chong, F., 2012, ISSE 2012 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2012 Conference. p. 316-325 10 p. (ISSE 2012 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2012 Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Hardware enhanced security

    Lee, R. B-L., Sethumadhavan, S. & Suh, G. E., Nov 26 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. 1 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Integration of butterfly and inverse butterfly nets in embedded processors: Effects on power saving

    Cardarilli, G. C., Di Nunzio, L., Fazzolari, R., Re, M. & Lee, R. B., 2012, Conference Record of the 46th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2012. p. 1457-1459 3 p. 6489268. (Conference Record - Asilomar Conference on Signals, Systems and Computers).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Physical attack protection with human-secure virtualization in data centers

    Szefer, J., Jamkhedkar, P., Chen, Y. Y. & Lee, R. B-L., Dec 1 2012, 2012 IEEE/IFIP 42nd International Conference on Dependable Systems and Networks Workshops, DSN-W 2012. 6264664. (Proceedings of the International Conference on Dependable Systems and Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Security verification of hardware-enabled attestation protocols

    Zhang, T., Szefer, J. & Lee, R. B., Dec 1 2012, Proceedings - 2012 IEEE/ACM 45th International Symposium on Microarchitecture Workshops, MICROW 2012. p. 47-54 8 p. 6472491. (Proceedings - 2012 IEEE/ACM 45th International Symposium on Microarchitecture Workshops, MICROW 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2011

    A case for hardware protection of guest VMs from compromised hypervisors in cloud computing

    Szefer, J. & Lee, R. B., Sep 9 2011, Proceedings - 31st International Conference on Distributed Computing Systems Workshops, ICDCSW 2011. p. 248-252 5 p. 5961523. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • Eliminating the hypervisor attack surface for a more secure cloud

    Szefer, J., Keller, E., Lee, R. B-L. & Rexford, J. L., 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 401-412 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    193 Scopus citations
  • Rapid single-chip secure processor prototyping on the Open SPARC FPGA platform

    Szefer, J. M., Zhang, W., Chen, Y. Y., Champagne, D., Chan, K., Li, W. X. Y., Cheung, R. C. C. & Lee, R. B-L., Jul 28 2011, Proceedings of the 2011 22nd IEEE International Symposium on Rapid System Prototyping: Shortening the Path from Specification to Prototype, RSP-2011. p. 38-44 7 p. 5929973. (Proceedings of the International Workshop on Rapid System Prototyping).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • 2010

    A framework for testing hardware-software security architectures

    Dwoskin, J. S., Gomathisankaran, M., Chen, Y. Y. & Lee, R. B., 2010, Proceedings - 26th Annual Computer Security Applications Conference, ACSAC 2010. p. 387-397 11 p. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Butterfly and inverse butterfly nets integration on Altera NIOS-II embedded processor

    Cardarilli, G. C., Di Nunzio, L., Fazzolari, R., Re, M. & Lee, R. B., 2010, Conference Record of the 44th Asilomar Conference on Signals, Systems and Computers, Asilomar 2010. p. 1279-1283 5 p. 5757737. (Conference Record - Asilomar Conference on Signals, Systems and Computers).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations