• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1980 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • A 32kB secure cache memory with dynamic replacement mapping in 65nm bulk CMOS

    Erbagci, B., Liu, F., Cakir, C., Akkaya, N. E. C., Lee, R. B-L. & Mai, K., Jan 19 2016, 2015 IEEE Asian Solid-State Circuits Conference, A-SSCC 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7387501. (2015 IEEE Asian Solid-State Circuits Conference, A-SSCC 2015 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • A case for hardware protection of guest VMs from compromised hypervisors in cloud computing

    Szefer, J. & Lee, R. B., Sep 9 2011, Proceedings - 31st International Conference on Distributed Computing Systems Workshops, ICDCSW 2011. p. 248-252 5 p. 5961523. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • Accelerating the Whirlpool Hash Function using parallel table lookup and fast cyclical permutation

    Hilewitz, Y., Yin, Y. L. & Lee, R. B., Sep 1 2008, Fast Software Encryption - 15th International Workshop, FSE 2008, Revised Selected Papers. p. 173-188 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5086 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Accountability in hosted virtual networks

    Keller, E., Lee, R. B-L. & Rexford, J. L., Aug 17 2009, SIGCOMM 2009 - Proceedings of the 2009 SIGCOMM Conference and Co-Located Workshops, VISA 2009. Association for Computing Machinery, Inc, p. 29-35 7 p. (SIGCOMM 2009 - Proceedings of the 2009 SIGCOMM Conference and Co-Located Workshops, VISA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Scopus citations
  • Adding 3D graphics support to PLX

    Yang, X. & Lee, R., Dec 1 2003, Proceedings, ITRE 2003 - International Conference on Information Technology: Research and Education. p. 40-44 5 p. 1270568. (Proceedings, ITRE 2003 - International Conference on Information Technology: Research and Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • A framework for testing hardware-software security architectures

    Dwoskin, J. S., Gomathisankaran, M., Chen, Y. Y. & Lee, R. B., 2010, Proceedings - 26th Annual Computer Security Applications Conference, ACSAC 2010. p. 387-397 11 p. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • A hardware-based technique for efficient implicit information flow tracking

    Shin, J., Zhang, H., Lee, J., Heo, I., Chen, Y. Y., Lee, R. & Paek, Y., Nov 7 2016, 2016 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2016. Institute of Electrical and Electronics Engineers Inc., 2966991. (IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD; vol. 07-10-November-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Analyzing cache side channels using deep neural networks

    Zhang, T., Zhang, Y. & Lee, R. B., Dec 3 2018, ACM International Conference Proceeding Series. Association for Computing Machinery, p. 174-186 13 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • A novel cache architecture with enhanced performance and security

    Wang, Z. & Lee, R. B., 2008, 2008 Proceedings of the 41st Annual IEEE/ACM International Symposium on Microarchitecture, MICRO-41. 2008 PROCEEDINGS ed. p. 83-93 11 p. 4771781. (Proceedings of the Annual International Symposium on Microarchitecture, MICRO; no. 2008 PROCEEDINGS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    167 Scopus citations
  • A processor architecture defense against buffer overflow attacks

    McGregor, J. P., Karig, D. K., Shi, Z. & Lee, R. B., 2003, Proceedings, ITRE 2003 - International Conference on Information Technology: Research and Education. p. 243-250 8 p. 1270612. (Proceedings, ITRE 2003 - International Conference on Information Technology: Research and Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    49 Scopus citations
  • Arbitrary bit permutations in one or two cycles

    Shi, Z., Yang, X. & Lee, R. B., 2003, Proceedings - IEEE International Conference on Application-Specific Systems, Architectures, and Processors, ASAP 2003. Deprettere, E., Bhattacharyya, S., Thiele, L., Cavallaro, J. & Darte, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 237-247 11 p. 1212847. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors; vol. 2003-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Scopus citations
  • Architectural support for hypervisor-secure virtualization

    Szefer, J. & Lee, R. B-L., Mar 28 2012, ASPLOS XVII - 17th International Conference on Architectural Support for Programming Languages and Operating Systems. p. 437-449 13 p. (International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    96 Scopus citations
  • Architecture for a non-copyable disk (NCdisk) using a Secret-Protection (SP) SoC solution

    Wang, M. S. & Ruby, B. L., 2007, Conference Record of the 41st Asilomar Conference on Signals, Systems and Computers, ACSSC. p. 1999-2003 5 p. 4487587. (Conference Record - Asilomar Conference on Signals, Systems and Computers).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • A software-hardware architecture for self-protecting data

    Chen, Y. Y., Jamkhedkar, P. A. & Lee, R. B., Nov 26 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 14-27 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Scopus citations
  • Bit matrix multiplication in commodity processors

    Hilewitz, Y., Lauradoux, C. & Lee, R. B., Sep 18 2008, ASAP08, Conference Proceedings - IEEE 19th International Conference on Application-Specific Systems, Architectures and Processors. p. 7-12 6 p. 4580146. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Bit permutation instructions for accelerating software cryptography

    Shi, Z. & Lee, R. B-L., Dec 3 2000, Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors. p. 138-148 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    100 Scopus citations
  • Blind De-anonymization Attacks using Social Networks

    Lee, W. H., Ji, S., Liu, C., Mittal, P. & Lee, R. B., Oct 30 2017, WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 1-4 4 p. (WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Building technologies that help cyber-defense: Hardware-enabled trust

    Vishik, C., Lee, R. B. & Chong, F., 2012, ISSE 2012 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2012 Conference. p. 316-325 10 p. (ISSE 2012 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2012 Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Butterfly and inverse butterfly nets integration on Altera NIOS-II embedded processor

    Cardarilli, G. C., Di Nunzio, L., Fazzolari, R., Re, M. & Lee, R. B., 2010, Conference Record of the 44th Asilomar Conference on Signals, Systems and Computers, Asilomar 2010. p. 1279-1283 5 p. 5757737. (Conference Record - Asilomar Conference on Signals, Systems and Computers).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Can randomized mapping secure instruction caches from side-channel attacks?

    Liu, F., Wu, H. & Lee, R. B., Jun 14 2015, Hardware and Architectural Support for Security and Privacy, HASP 2015. Association for Computing Machinery, a4. (ACM International Conference Proceeding Series; vol. 14-June-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • CATalyst: Defeating last-level cache side channel attacks in cloud computing

    Liu, F., Ge, Q., Yarom, Y., McKeen, F., Rozas, C., Heiser, G. & Lee, R. B-L., Apr 1 2016, Proceedings of the 2016 IEEE International Symposium on High-Performance Computer Architecture, HPCA 2016. IEEE Computer Society, p. 406-418 13 p. 7446082. (Proceedings - International Symposium on High-Performance Computer Architecture; vol. 2016-April).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    193 Scopus citations
  • Characterizing hypervisor vulnerabilities in cloud computing servers

    Perez-Botero, D., Szefer, J. & Lee, R. B., Jun 7 2013, Cloud Computing 2013 - Proceedings of the 2013 International Workshop on Security in Cloud Computing. p. 3-10 8 p. (Cloud Computing 2013 - Proceedings of the 2013 International Workshop on Security in Cloud Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    128 Scopus citations
  • CloudMonatt: An architecture for security health monitoring and attestation of virtual machines in cloud computing

    Zhang, T. & Lee, R. B., Jun 13 2015, ISCA 2015 - 42nd Annual International Symposium on Computer Architecture, Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 362-374 13 p. (Proceedings - International Symposium on Computer Architecture; vol. 13-17-June-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • Cloudradar: A real-time side-channel attack detection system in clouds

    Zhang, T., Zhang, Y. & Lee, R. B., 2016, Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Dacier, M., Monrose, F., Blanc, G. & Garcia-Alfaro, J. (eds.). Springer Verlag, p. 118-140 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    75 Scopus citations
  • CloudShelter: Protecting virtual machines' memory resource availability in clouds

    Zhang, T., Xu, Y., Bao, Y. & Lee, R. B., Nov 22 2017, Proceedings - 35th IEEE International Conference on Computer Design, ICCD 2017. Institute of Electrical and Electronics Engineers Inc., p. 557-564 8 p. 8119270. (Proceedings - 35th IEEE International Conference on Computer Design, ICCD 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Computer arithmetic - A processor architect's perspective

    Lee, R. B-L., Jan 1 2001, Proceedings - Symposium on Computer Arithmetic. p. 3-4 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Covert and side channels due to processor architecture

    Wang, Z. & Lee, R. B., 2006, Proceedings - Annual Computer Security Applications Conference, ACSAC. p. 473-482 10 p. 4041191. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    176 Scopus citations
  • Cyber defenses for physical attacks and insider threats in cloud computing

    Szefer, J., Jamkhedkar, P., Perez-Botero, D. & Lee, R. B., Jun 4 2014, ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, Inc, p. 519-524 6 p. (ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Disruptive prefetching: Impact on side-channel attacks and cache designs

    Fuchs, A. & Lee, R. B., May 26 2015, SYSTOR 2015 - Proceedings of the 8th ACM International Systems and Storage Conference. Association for Computing Machinery, Inc, 2757672. (SYSTOR 2015 - Proceedings of the 8th ACM International Systems and Storage Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • DoS attacks on your memory in the cloud

    Zhang, T., Zhang, Y. & Lee, R. B., Apr 2 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 253-265 13 p. (ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Scopus citations
  • EFFICIENT TESTING OF RISC MICROPROCESSORS.

    Hsu, J. T. G., Lee, R. B-L. & Burroughs, G. D., Dec 1 1986, Unknown Host Publication Title. IEEE, p. 15-18 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Eliminating the hypervisor attack surface for a more secure cloud

    Szefer, J., Keller, E., Lee, R. B-L. & Rexford, J. L., 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 401-412 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    194 Scopus citations
  • Fast bit compression and expansion with parallel extract and parallel deposit instructions

    Hilewitz, Y. & Lee, R. B., 2006, Proceedings - IEEE 17th International Conference on Application-specific Systems, Architectures and Processors, ASAP 2006. p. 65-70 6 p. 4019493. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Fast parallel table lookups to accelerate symmetric-key cryptography

    Fiskiran, A. M. & Lee, R. B-L., Sep 21 2005, Proceedings ITCC 2005 - International Conference on Information Technology: Coding and Computing. Selvaraj, H. & Srimani, P. K. (eds.). p. 526-531 6 p. (International Conference on Information Technology: Coding and Computing, ITCC; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Forward-secure content distribution to reconfigurable hardware

    Champagne, D., Elbaz, R., Gebotys, C., Torres, L. & Lee, R. B., 2008, Proceedings - 2008 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2008. p. 450-455 6 p. 4731836. (Proceedings - 2008 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • General-purpose FPGA platform for efficient encryption and hashing

    Szefer, J., Chen, Y. Y. & Lee, R. B-L., Aug 27 2010, ASAP 10 - 21st IEEE International Conference on Application-Specific Systems, Architectures and Processors, Conference Proceedings. p. 309-312 4 p. 5540976. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Hardware-assisted application-level access control

    Chen, Y. Y. & Lee, R. B., 2009, Information Security - 12th International Conference, ISC 2009, Proceedings. p. 363-378 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5735 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Hardware enhanced security

    Lee, R. B-L., Sethumadhavan, S. & Suh, G. E., Nov 26 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. 1 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Hardware mechanisms for memory authentication: A survey of existing techniques and engines

    Elbaz, R., Champagne, D., Gebotys, C., Lee, R. B., Potlapally, N. & Torres, L., 2009, Transactions on Computational Science IV: Special Issue on Security in Computing. p. 1-22 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    56 Scopus citations
  • Hardware-rooted trust for secure key management and transient trust

    Dwoskin, J. S. & Lee, R. B-L., Dec 1 2007, CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. p. 389-400 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    59 Scopus citations
  • Host-based DoS attacks and defense in the cloud

    Zhang, T. & Lee, R. B., Jun 25 2017, Hardware and Architectural Support for Security and Privacy, HASP 2017. Association for Computing Machinery, 3092630. (ACM International Conference Proceeding Series; vol. Part F128533).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • HotChips security tutorial

    Lee, R. B., Chandra, V., Van Doorn, L. & Durham, D., May 25 2016, 2014 IEEE Hot Chips 26 Symposium, HCS 2014. Institute of Electrical and Electronics Engineers Inc., 7478794. (2014 IEEE Hot Chips 26 Symposium, HCS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • How bad is suboptimal rate allocation?

    Lan, T., Lin, X., Chiang, M. & Lee, R., 2008, INFOCOM 2008: 27th IEEE Communications Society Conference on Computer Communications. p. 951-959 9 p. 4509668. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • How secure is your cache against side-channel attacks?

    He, Z. & Lee, R. B., Oct 14 2017, MICRO 2017 - 50th Annual IEEE/ACM International Symposium on Microarchitecture Proceedings. IEEE Computer Society, p. 341-353 13 p. (Proceedings of the Annual International Symposium on Microarchitecture, MICRO; vol. Part F131207).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    34 Scopus citations
  • How to quantify graph De-anonymization risks

    Lee, W. H., Liu, C., Ji, S., Mittal, P. & Lee, R. B., 2018, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Mori, P., Camp, O. & Furnell, S. (eds.). Springer Verlag, p. 84-104 21 p. (Communications in Computer and Information Science; vol. 867).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • HP Precision: A spectrum architecture.

    Lee, R. B., Dec 1 1989, Proceedings of the Hawaii International Conference on System Science. Publ by IEEE, p. 242-251 10 p. (Proceedings of the Hawaii International Conference on System Science; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • HP's PA7100LC: a low-cost superscalar PA-RISC processor

    Knebel, P., Arnold, B., Bass, M., Kever, W., Lamb, J. D., Lee, R. B., Perez, P. L., Undy, S. & Walker, W., Jan 1 1993, 1993 IEEE Compcon Spring. Publ by IEEE, p. 441-447 7 p. (1993 IEEE Compcon Spring).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Impact of configurability and extensibility on IPSec protocol execution on embedded processors

    Potlapally, N. R., Ravi, S., Raghunalhan, A., Lee, R. B. & Jha, N. K., Sep 18 2006, Proceedings - 19th International Conference on VLSI Design held jointly with 5th International Conference on Embedded Systems Design. p. 299-304 6 p. 1581468. (Proceedings of the IEEE International Conference on VLSI Design; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Implicit authentication for smartphone security

    Lee, W. H. & Lee, R. B., 2015, 1st International Conference on Information Systems Security and Privacy, ICISSP 2015. Camp, O., Aïmeur, E., Weippl, E. & Bidan, C. (eds.). Springer Verlag, p. 160-176 17 p. (Communications in Computer and Information Science; vol. 576).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Implicit sensor-based authentication of smartphone users with smartwatch

    Lee, W. H. & Lee, R., Jun 18 2016, Hardware and Architectural Support for Security and Privacy, HASP 2016. Association for Computing Machinery, 2948627. (ACM International Conference Proceeding Series; vol. 18-June-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations