BibTeX records: Ruby B. Lee

download as .bib file

@inproceedings{DBLP:conf/codaspy/HeHL23,
  author       = {Zecheng He and
                  Guangyuan Hu and
                  Ruby B. Lee},
  editor       = {Mohamed Shehab and
                  Maribel Fern{\'{a}}ndez and
                  Ninghui Li},
  title        = {CloudShield: Real-time Anomaly Detection in the Cloud},
  booktitle    = {Proceedings of the Thirteenth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26,
                  2023},
  pages        = {91--102},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577923.3583639},
  doi          = {10.1145/3577923.3583639},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/HeHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-03724,
  author       = {Guangyuan Hu and
                  Zecheng He and
                  Ruby B. Lee},
  title        = {SoK: Hardware Defenses Against Speculative Execution Attacks},
  journal      = {CoRR},
  volume       = {abs/2301.03724},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.03724},
  doi          = {10.48550/ARXIV.2301.03724},
  eprinttype    = {arXiv},
  eprint       = {2301.03724},
  timestamp    = {Thu, 19 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-03724.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-00732,
  author       = {Guangyuan Hu and
                  Ruby B. Lee},
  title        = {Protecting Cache States Against Both Speculative Execution Attacks
                  and Side-channel Attacks},
  journal      = {CoRR},
  volume       = {abs/2302.00732},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.00732},
  doi          = {10.48550/ARXIV.2302.00732},
  eprinttype    = {arXiv},
  eprint       = {2302.00732},
  timestamp    = {Thu, 09 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-00732.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-16172,
  author       = {Guangyuan Hu and
                  Ruby B. Lee},
  title        = {Random and Safe Cache Architecture to Defeat Cache Timing Attacks},
  journal      = {CoRR},
  volume       = {abs/2309.16172},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.16172},
  doi          = {10.48550/ARXIV.2309.16172},
  eprinttype    = {arXiv},
  eprint       = {2309.16172},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-16172.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HeZL21,
  author       = {Zecheng He and
                  Tianwei Zhang and
                  Ruby B. Lee},
  title        = {Attacking and Protecting Data Privacy in Edge-Cloud Collaborative
                  Inference Systems},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {12},
  pages        = {9706--9716},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3022358},
  doi          = {10.1109/JIOT.2020.3022358},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/HeZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/HeSZXLWSLC21,
  author       = {Zecheng He and
                  Srinivas Sunkara and
                  Xiaoxue Zang and
                  Ying Xu and
                  Lijuan Liu and
                  Nevan Wichers and
                  Gabriel Schubiner and
                  Ruby B. Lee and
                  Jindong Chen},
  title        = {ActionBert: Leveraging User Actions for Semantic Understanding of
                  User Interfaces},
  booktitle    = {Thirty-Fifth {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2021, Thirty-Third Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2021, The Eleventh Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2021, Virtual Event, February 2-9,
                  2021},
  pages        = {5931--5938},
  publisher    = {{AAAI} Press},
  year         = {2021},
  url          = {https://doi.org/10.1609/aaai.v35i7.16741},
  doi          = {10.1609/AAAI.V35I7.16741},
  timestamp    = {Mon, 04 Sep 2023 12:29:24 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/HeSZXLWSLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Lee21,
  author       = {Ruby B. Lee},
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Stefan Katzenbeisser and
                  Debdeep Mukhopadhyay},
  title        = {Speculative Execution Attacks and Hardware Defenses},
  booktitle    = {ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions
                  in Hardware Security, Virtual Event, Republic of Korea, 19 November
                  2021},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474376.3487404},
  doi          = {10.1145/3474376.3487404},
  timestamp    = {Thu, 11 Nov 2021 09:27:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Lee21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpca/HeHL21,
  author       = {Zecheng He and
                  Guangyuan Hu and
                  Ruby B. Lee},
  title        = {New Models for Understanding and Reasoning about Speculative Execution
                  Attacks},
  booktitle    = {{IEEE} International Symposium on High-Performance Computer Architecture,
                  {HPCA} 2021, Seoul, South Korea, February 27 - March 3, 2021},
  pages        = {40--53},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/HPCA51647.2021.00014},
  doi          = {10.1109/HPCA51647.2021.00014},
  timestamp    = {Tue, 27 Apr 2021 14:46:03 +0200},
  biburl       = {https://dblp.org/rec/conf/hpca/HeHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/0004JL21,
  author       = {Tianwei Zhang and
                  Jakub Szefer and
                  Ruby B. Lee},
  title        = {Practical and Scalable Security Verification of Secure Architectures},
  booktitle    = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  pages        = {2:1--2:9},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253.3505256},
  doi          = {10.1145/3505253.3505256},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/0004JL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seed/HuHL21,
  author       = {Guangyuan Hu and
                  Zecheng He and
                  Ruby B. Lee},
  title        = {SoK: Hardware Defenses Against Speculative Execution Attacks},
  booktitle    = {2021 International Symposium on Secure and Private Execution Environment
                  Design (SEED), Washington, DC, USA, September 20-21, 2021},
  pages        = {108--120},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SEED51797.2021.00023},
  doi          = {10.1109/SEED51797.2021.00023},
  timestamp    = {Tue, 08 Nov 2022 13:30:39 +0100},
  biburl       = {https://dblp.org/rec/conf/seed/HuHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-06453,
  author       = {Guangyuan Hu and
                  Zecheng He and
                  Ruby B. Lee},
  title        = {Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist
                  Hardware Support},
  journal      = {CoRR},
  volume       = {abs/2103.06453},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.06453},
  eprinttype    = {arXiv},
  eprint       = {2103.06453},
  timestamp    = {Tue, 16 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-06453.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-08977,
  author       = {Zecheng He and
                  Ruby B. Lee},
  title        = {CloudShield: Real-time Anomaly Detection in the Cloud},
  journal      = {CoRR},
  volume       = {abs/2108.08977},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.08977},
  eprinttype    = {arXiv},
  eprint       = {2108.08977},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-08977.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/Hu0L20,
  author       = {Guangyuan Hu and
                  Tianwei Zhang and
                  Ruby B. Lee},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {6:1--6:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458909},
  doi          = {10.1145/3458903.3458909},
  timestamp    = {Tue, 26 Oct 2021 15:43:33 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/Hu0L20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/micro/2020hasp,
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903},
  doi          = {10.1145/3458903},
  isbn         = {978-1-4503-8898-6},
  timestamp    = {Tue, 26 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/2020hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-03914,
  author       = {Guangyuan Hu and
                  Zecheng He and
                  Ruby B. Lee},
  title        = {Smartphone Impostor Detection with Built-in Sensors and Deep Learning},
  journal      = {CoRR},
  volume       = {abs/2002.03914},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.03914},
  eprinttype    = {arXiv},
  eprint       = {2002.03914},
  timestamp    = {Wed, 12 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-03914.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-07998,
  author       = {Zecheng He and
                  Guangyuan Hu and
                  Ruby B. Lee},
  title        = {New Models for Understanding and Reasoning about Speculative Execution
                  Attacks},
  journal      = {CoRR},
  volume       = {abs/2009.07998},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.07998},
  eprinttype    = {arXiv},
  eprint       = {2009.07998},
  timestamp    = {Wed, 23 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-07998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-12350,
  author       = {Zecheng He and
                  Srinivas Sunkara and
                  Xiaoxue Zang and
                  Ying Xu and
                  Lijuan Liu and
                  Nevan Wichers and
                  Gabriel Schubiner and
                  Ruby B. Lee and
                  Jindong Chen},
  title        = {ActionBert: Leveraging User Actions for Semantic Understanding of
                  User Interfaces},
  journal      = {CoRR},
  volume       = {abs/2012.12350},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.12350},
  eprinttype    = {arXiv},
  eprint       = {2012.12350},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-12350.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HeZL19,
  author       = {Zecheng He and
                  Tianwei Zhang and
                  Ruby B. Lee},
  editor       = {David Balenson},
  title        = {Model inversion attacks against collaborative inference},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {148--162},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359824},
  doi          = {10.1145/3359789.3359824},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HeZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/HeZL19,
  author       = {Zecheng He and
                  Tianwei Zhang and
                  Ruby B. Lee},
  title        = {Sensitive-Sample Fingerprinting of Deep Neural Networks},
  booktitle    = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR}
                  2019, Long Beach, CA, USA, June 16-20, 2019},
  pages        = {4729--4737},
  publisher    = {Computer Vision Foundation / {IEEE}},
  year         = {2019},
  url          = {http://openaccess.thecvf.com/content\_CVPR\_2019/html/He\_Sensitive-Sample\_Fingerprinting\_of\_Deep\_Neural\_Networks\_CVPR\_2019\_paper.html},
  doi          = {10.1109/CVPR.2019.00486},
  timestamp    = {Mon, 30 Aug 2021 17:01:14 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/HeZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HeRHCL19,
  author       = {Zecheng He and
                  Aswin Raghavan and
                  Guangyuan Hu and
                  Sek M. Chai and
                  Ruby B. Lee},
  title        = {Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep
                  Learning},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {160--167},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00030},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00030},
  timestamp    = {Thu, 14 Nov 2019 10:35:10 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HeRHCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/SchaumontLPB18,
  author       = {Patrick Schaumont and
                  Ruby B. Lee and
                  Ronald Perez and
                  Guido Bertoni},
  title        = {Special Section on Secure Computer Architectures},
  journal      = {{IEEE} Trans. Computers},
  volume       = {67},
  number       = {3},
  pages        = {305--306},
  year         = {2018},
  url          = {https://doi.org/10.1109/TC.2017.2788658},
  doi          = {10.1109/TC.2017.2788658},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/SchaumontLPB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/ZhangL18,
  author       = {Tianwei Zhang and
                  Ruby B. Lee},
  title        = {Design, Implementation and Verification of Cloud Architecture for
                  Monitoring a Virtual Machine's Security Health},
  journal      = {{IEEE} Trans. Computers},
  volume       = {67},
  number       = {6},
  pages        = {799--815},
  year         = {2018},
  url          = {https://doi.org/10.1109/TC.2017.2780823},
  doi          = {10.1109/TC.2017.2780823},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/ZhangL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangZL18,
  author       = {Tianwei Zhang and
                  Yinqian Zhang and
                  Ruby B. Lee},
  title        = {Analyzing Cache Side Channels Using Deep Neural Networks},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {174--186},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274715},
  doi          = {10.1145/3274694.3274715},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenLMZLCW18,
  author       = {Sanchuan Chen and
                  Fangfei Liu and
                  Zeyu Mi and
                  Yinqian Zhang and
                  Ruby B. Lee and
                  Haibo Chen and
                  XiaoFeng Wang},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {601--608},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196501},
  doi          = {10.1145/3196494.3196501},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenLMZLCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpca/ShalabiYHLT18,
  author       = {Yasser Shalabi and
                  Mengjia Yan and
                  Nima Honarmand and
                  Ruby B. Lee and
                  Josep Torrellas},
  title        = {Record-Replay Architecture as a General Security Framework},
  booktitle    = {{IEEE} International Symposium on High Performance Computer Architecture,
                  {HPCA} 2018, Vienna, Austria, February 24-28, 2018},
  pages        = {180--193},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/HPCA.2018.00025},
  doi          = {10.1109/HPCA.2018.00025},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpca/ShalabiYHLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LeeOKL18,
  author       = {Wei{-}Han Lee and
                  Jorge Ortiz and
                  Bongjun Ko and
                  Ruby B. Lee},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {139--148},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006650301390148},
  doi          = {10.5220/0006650301390148},
  timestamp    = {Fri, 07 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LeeOKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2018hasp,
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292},
  doi          = {10.1145/3214292},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/2018hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-05394,
  author       = {Wei{-}Han Lee and
                  Jorge Ortiz and
                  Bongjun Ko and
                  Ruby B. Lee},
  title        = {Time Series Segmentation through Automatic Feature Learning},
  journal      = {CoRR},
  volume       = {abs/1801.05394},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.05394},
  eprinttype    = {arXiv},
  eprint       = {1801.05394},
  timestamp    = {Fri, 07 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-05394.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-05534,
  author       = {Wei{-}Han Lee and
                  Changchang Liu and
                  Shouling Ji and
                  Prateek Mittal and
                  Ruby B. Lee},
  title        = {Blind De-anonymization Attacks using Social Networks},
  journal      = {CoRR},
  volume       = {abs/1801.05534},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.05534},
  eprinttype    = {arXiv},
  eprint       = {1801.05534},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-05534.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-06496,
  author       = {Zecheng He and
                  Aswin Raghavan and
                  Sek M. Chai and
                  Ruby B. Lee},
  title        = {Detecting Zero-day Controller Hijacking Attacks on the Power-Grid
                  with Enhanced Deep Learning},
  journal      = {CoRR},
  volume       = {abs/1806.06496},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.06496},
  eprinttype    = {arXiv},
  eprint       = {1806.06496},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-06496.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-01854,
  author       = {Jakub Szefer and
                  Tianwei Zhang and
                  Ruby B. Lee},
  title        = {Practical and Scalable Security Verification of Secure Architectures},
  journal      = {CoRR},
  volume       = {abs/1807.01854},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.01854},
  eprinttype    = {arXiv},
  eprint       = {1807.01854},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-01854.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-01860,
  author       = {Tianwei Zhang and
                  Zecheng He and
                  Ruby B. Lee},
  title        = {Privacy-preserving Machine Learning through Data Obfuscation},
  journal      = {CoRR},
  volume       = {abs/1807.01860},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.01860},
  eprinttype    = {arXiv},
  eprint       = {1807.01860},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-01860.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-03277,
  author       = {Zecheng He and
                  Tianwei Zhang and
                  Ruby B. Lee},
  title        = {VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample
                  Fingerprinting},
  journal      = {CoRR},
  volume       = {abs/1808.03277},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.03277},
  eprinttype    = {arXiv},
  eprint       = {1808.03277},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-03277.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cal/WuLL17,
  author       = {Hao Wu and
                  Fangfei Liu and
                  Ruby B. Lee},
  title        = {Cloud Server Benchmark Suite for Evaluating New Hardware Architectures},
  journal      = {{IEEE} Comput. Archit. Lett.},
  volume       = {16},
  number       = {1},
  pages        = {14--17},
  year         = {2017},
  url          = {https://doi.org/10.1109/LCA.2016.2597818},
  doi          = {10.1109/LCA.2016.2597818},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cal/WuLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangZL17,
  author       = {Tianwei Zhang and
                  Yinqian Zhang and
                  Ruby B. Lee},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {DoS Attacks on Your Memory in Cloud},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {253--265},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3052978},
  doi          = {10.1145/3052973.3052978},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/HeZL17,
  author       = {Zecheng He and
                  Tianwei Zhang and
                  Ruby B. Lee},
  title        = {Machine Learning Based DDoS Attack Detection from Source Side in Cloud},
  booktitle    = {4th {IEEE} International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2017, New York, NY, USA, June 26-28, 2017},
  pages        = {114--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSCloud.2017.58},
  doi          = {10.1109/CSCLOUD.2017.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscloud/HeZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LeeL17,
  author       = {Wei{-}Han Lee and
                  Ruby B. Lee},
  title        = {Implicit Smartphone User Authentication with Sensors and Contextual
                  Machine Learning},
  booktitle    = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017},
  pages        = {297--308},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSN.2017.24},
  doi          = {10.1109/DSN.2017.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LeeL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LeeL17a,
  author       = {Wei{-}Han Lee and
                  Ruby B. Lee},
  title        = {Sensor-Based Implicit Authentication of Smartphone Users},
  booktitle    = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017},
  pages        = {309--320},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSN.2017.21},
  doi          = {10.1109/DSN.2017.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LeeL17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/ZhangXBL17,
  author       = {Tianwei Zhang and
                  Yuan Xu and
                  Yungang Bao and
                  Ruby B. Lee},
  title        = {CloudShelter: Protecting Virtual Machines' Memory Resource Availability
                  in Clouds},
  booktitle    = {2017 {IEEE} International Conference on Computer Design, {ICCD} 2017,
                  Boston, MA, USA, November 5-8, 2017},
  pages        = {557--564},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICCD.2017.97},
  doi          = {10.1109/ICCD.2017.97},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/ZhangXBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LeeLJML17a,
  author       = {Wei{-}Han Lee and
                  Changchang Liu and
                  Shouling Ji and
                  Prateek Mittal and
                  Ruby B. Lee},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {How to Quantify Graph De-anonymization Risks},
  booktitle    = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {84--104},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93354-2\_5},
  doi          = {10.1007/978-3-319-93354-2\_5},
  timestamp    = {Fri, 24 Aug 2018 07:46:20 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LeeLJML17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LeeLJML17,
  author       = {Wei{-}Han Lee and
                  Changchang Liu and
                  Shouling Ji and
                  Prateek Mittal and
                  Ruby B. Lee},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Quantification of De-anonymization Risks in Social Networks},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {126--135},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006192501260135},
  doi          = {10.5220/0006192501260135},
  timestamp    = {Thu, 18 May 2017 14:22:34 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LeeLJML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ZhangL17,
  author       = {Tianwei Zhang and
                  Ruby B. Lee},
  title        = {Host-Based Dos Attacks and Defense in the Cloud},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {3:1--3:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092630},
  doi          = {10.1145/3092627.3092630},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ZhangL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/HeL17,
  author       = {Zecheng He and
                  Ruby B. Lee},
  editor       = {Hillery C. Hunter and
                  Jaime Moreno and
                  Joel S. Emer and
                  Daniel S{\'{a}}nchez},
  title        = {How secure is your cache against side-channel attacks?},
  booktitle    = {Proceedings of the 50th Annual {IEEE/ACM} International Symposium
                  on Microarchitecture, {MICRO} 2017, Cambridge, MA, USA, October 14-18,
                  2017},
  pages        = {341--353},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3123939.3124546},
  doi          = {10.1145/3123939.3124546},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/HeL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/LeeLSJL17,
  author       = {Wei{-}Han Lee and
                  Xiaochen Liu and
                  Yilin Shen and
                  Hongxia Jin and
                  Ruby B. Lee},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Edgar R. Weippl},
  title        = {Secure Pick Up: Implicit Authentication When You Start Using the Smartphone},
  booktitle    = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23,
                  2017},
  pages        = {67--78},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3078861.3078870},
  doi          = {10.1145/3078861.3078870},
  timestamp    = {Tue, 09 Feb 2021 08:50:30 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/LeeLSJL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/LeeLJML17,
  author       = {Wei{-}Han Lee and
                  Changchang Liu and
                  Shouling Ji and
                  Prateek Mittal and
                  Ruby B. Lee},
  editor       = {Bhavani Thuraisingham and
                  Adam J. Lee},
  title        = {Blind De-anonymization Attacks using Social Networks},
  booktitle    = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society,
                  Dallas, TX, USA, October 30 - November 3, 2017},
  pages        = {1--4},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139550.3139562},
  doi          = {10.1145/3139550.3139562},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/LeeLJML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LeeL17a,
  author       = {Wei{-}Han Lee and
                  Ruby B. Lee},
  title        = {Multi-sensor authentication to improve smartphone security},
  journal      = {CoRR},
  volume       = {abs/1703.03378},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.03378},
  eprinttype    = {arXiv},
  eprint       = {1703.03378},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LeeL17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LeeL17b,
  author       = {Wei{-}Han Lee and
                  Ruby B. Lee},
  title        = {Implicit Sensor-based Authentication of Smartphone Users with Smartwatch},
  journal      = {CoRR},
  volume       = {abs/1703.03523},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.03523},
  eprinttype    = {arXiv},
  eprint       = {1703.03523},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LeeL17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LeeLJML17,
  author       = {Wei{-}Han Lee and
                  Changchang Liu and
                  Shouling Ji and
                  Prateek Mittal and
                  Ruby B. Lee},
  title        = {Quantification of De-anonymization Risks in Social Networks},
  journal      = {CoRR},
  volume       = {abs/1703.04873},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.04873},
  eprinttype    = {arXiv},
  eprint       = {1703.04873},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LeeLJML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-09366,
  author       = {Wei{-}Han Lee and
                  Xiaochen Liu and
                  Yilin Shen and
                  Hongxia Jin and
                  Ruby B. Lee},
  title        = {Secure Pick Up: Implicit Authentication When You Start Using the Smartphone},
  journal      = {CoRR},
  volume       = {abs/1708.09366},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.09366},
  eprinttype    = {arXiv},
  eprint       = {1708.09366},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-09366.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-09754,
  author       = {Wei{-}Han Lee and
                  Ruby B. Lee},
  title        = {Implicit Smartphone User Authentication with Sensors and Contextual
                  Machine Learning},
  journal      = {CoRR},
  volume       = {abs/1708.09754},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.09754},
  eprinttype    = {arXiv},
  eprint       = {1708.09754},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-09754.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/LiuWML16,
  author       = {Fangfei Liu and
                  Hao Wu and
                  Kenneth Mai and
                  Ruby B. Lee},
  title        = {Newcache: Secure Cache Architecture Thwarting Cache Side-Channel Attacks},
  journal      = {{IEEE} Micro},
  volume       = {36},
  number       = {5},
  pages        = {8--16},
  year         = {2016},
  url          = {https://doi.org/10.1109/MM.2016.85},
  doi          = {10.1109/MM.2016.85},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/micro/LiuWML16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/ZhangL16,
  author       = {Tianwei Zhang and
                  Ruby B. Lee},
  title        = {Monitoring and Attestation of Virtual Machine Security Health in Cloud
                  Computing},
  journal      = {{IEEE} Micro},
  volume       = {36},
  number       = {5},
  pages        = {28--37},
  year         = {2016},
  url          = {https://doi.org/10.1109/MM.2016.86},
  doi          = {10.1109/MM.2016.86},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/micro/ZhangL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/MontuschiMCCRDE16,
  author       = {Paolo Montuschi and
                  Edward J. McCluskey and
                  Samarjit Chakraborty and
                  Jason Cong and
                  Ram{\'{o}}n M. Rodr{\'{\i}}guez{-}Dagnino and
                  Fred Douglis and
                  Lieven Eeckhout and
                  Gernot Heiser and
                  Sushil Jajodia and
                  Ruby B. Lee and
                  Dinesh Manocha and
                  Tom{\'{a}}s F. Pena and
                  Isabelle Puaut and
                  Hanan Samet and
                  Donatella Sciuto},
  title        = {State of the Journal},
  journal      = {{IEEE} Trans. Computers},
  volume       = {65},
  number       = {7},
  pages        = {2014--2018},
  year         = {2016},
  url          = {https://doi.org/10.1109/TC.2016.2568358},
  doi          = {10.1109/TC.2016.2568358},
  timestamp    = {Thu, 27 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/MontuschiMCCRDE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpca/LiuGYMRHL16,
  author       = {Fangfei Liu and
                  Qian Ge and
                  Yuval Yarom and
                  Frank McKeen and
                  Carlos V. Rozas and
                  Gernot Heiser and
                  Ruby B. Lee},
  title        = {CATalyst: Defeating last-level cache side channel attacks in cloud
                  computing},
  booktitle    = {2016 {IEEE} International Symposium on High Performance Computer Architecture,
                  {HPCA} 2016, Barcelona, Spain, March 12-16, 2016},
  pages        = {406--418},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HPCA.2016.7446082},
  doi          = {10.1109/HPCA.2016.7446082},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpca/LiuGYMRHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccad/ShinZLHCLP16,
  author       = {Jangseop Shin and
                  Hongce Zhang and
                  Jinyong Lee and
                  Ingoo Heo and
                  Yu{-}Yuan Chen and
                  Ruby B. Lee and
                  Yunheung Paek},
  editor       = {Frank Liu},
  title        = {A hardware-based technique for efficient implicit information flow
                  tracking},
  booktitle    = {Proceedings of the 35th International Conference on Computer-Aided
                  Design, {ICCAD} 2016, Austin, TX, USA, November 7-10, 2016},
  pages        = {94},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2966986.2966991},
  doi          = {10.1145/2966986.2966991},
  timestamp    = {Fri, 23 Jun 2023 22:29:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iccad/ShinZLHCLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/LeeL16,
  author       = {Wei{-}Han Lee and
                  Ruby B. Lee},
  title        = {Implicit Sensor-based Authentication of Smartphone Users with Smartwatch},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {9:1--9:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948627},
  doi          = {10.1145/2948618.2948627},
  timestamp    = {Tue, 06 Nov 2018 11:07:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/LeeL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangZL16,
  author       = {Tianwei Zhang and
                  Yinqian Zhang and
                  Ruby B. Lee},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {CloudRadar: {A} Real-Time Side-Channel Attack Detection System in
                  Clouds},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {118--140},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_6},
  doi          = {10.1007/978-3-319-45719-2\_6},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuLL16,
  author       = {Hao Wu and
                  Fangfei Liu and
                  Ruby B. Lee},
  title        = {Cloud Server Benchmarks for Performance Evaluation of New Hardware
                  Architecture},
  journal      = {CoRR},
  volume       = {abs/1603.01352},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.01352},
  eprinttype    = {arXiv},
  eprint       = {1603.01352},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhangZL16,
  author       = {Tianwei Zhang and
                  Yinqian Zhang and
                  Ruby B. Lee},
  title        = {Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation},
  journal      = {CoRR},
  volume       = {abs/1603.03404},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.03404},
  eprinttype    = {arXiv},
  eprint       = {1603.03404},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhangZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Lee15,
  author       = {Ruby B. Lee},
  title        = {Rethinking Computers for Cybersecurity},
  journal      = {Computer},
  volume       = {48},
  number       = {4},
  pages        = {16--25},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.118},
  doi          = {10.1109/MC.2015.118},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Lee15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asscc/ErbagciLCALM15,
  author       = {Burak Erbagci and
                  Fangfei Liu and
                  Cagla Cakir and
                  Nail Etkin Can Akkaya and
                  Ruby B. Lee and
                  Ken Mai},
  title        = {A 32kB secure cache memory with dynamic replacement mapping in 65nm
                  bulk {CMOS}},
  booktitle    = {{IEEE} Asian Solid-State Circuits Conference, {A-SSCC} 2015, Xia'men,
                  China, November 9-11, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ASSCC.2015.7387501},
  doi          = {10.1109/ASSCC.2015.7387501},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/asscc/ErbagciLCALM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LeeL15a,
  author       = {Wei{-}Han Lee and
                  Ruby B. Lee},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Implicit Authentication for Smartphone Security},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {160--176},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_10},
  doi          = {10.1007/978-3-319-27668-7\_10},
  timestamp    = {Thu, 16 May 2019 16:43:34 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LeeL15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LeeL15,
  author       = {Wei{-}Han Lee and
                  Ruby B. Lee},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Multi-sensor Authentication to Improve Smartphone Security},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {270--280},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005239802700280},
  doi          = {10.5220/0005239802700280},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LeeL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/LiuWL15,
  author       = {Fangfei Liu and
                  Hao Wu and
                  Ruby B. Lee},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Can randomized mapping secure instruction caches from side-channel
                  attacks?},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768570},
  doi          = {10.1145/2768566.2768570},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/LiuWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ZhangL15,
  author       = {Tianwei Zhang and
                  Ruby B. Lee},
  editor       = {Deborah T. Marr and
                  David H. Albonesi},
  title        = {CloudMonatt: an architecture for security health monitoring and attestation
                  of virtual machines in cloud computing},
  booktitle    = {Proceedings of the 42nd Annual International Symposium on Computer
                  Architecture, Portland, OR, USA, June 13-17, 2015},
  pages        = {362--374},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2749469.2750422},
  doi          = {10.1145/2749469.2750422},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ZhangL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiuYGHL15,
  author       = {Fangfei Liu and
                  Yuval Yarom and
                  Qian Ge and
                  Gernot Heiser and
                  Ruby B. Lee},
  title        = {Last-Level Cache Side-Channel Attacks are Practical},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {605--622},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.43},
  doi          = {10.1109/SP.2015.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LiuYGHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/systor/FuchsL15,
  author       = {Adi Fuchs and
                  Ruby B. Lee},
  editor       = {Dalit Naor and
                  Gernot Heiser and
                  Idit Keidar},
  title        = {Disruptive prefetching: impact on side-channel attacks and cache designs},
  booktitle    = {Proceedings of the 8th {ACM} International Systems and Storage Conference,
                  {SYSTOR} 2015, Haifa, Israel, May 26-28, 2015},
  pages        = {14:1--14:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2757667.2757672},
  doi          = {10.1145/2757667.2757672},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/systor/FuchsL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2015hasp,
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566},
  doi          = {10.1145/2768566},
  isbn         = {978-1-4503-3483-9},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/2015hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaromGLLH15,
  author       = {Yuval Yarom and
                  Qian Ge and
                  Fangfei Liu and
                  Ruby B. Lee and
                  Gernot Heiser},
  title        = {Mapping the Intel Last-Level Cache},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {905},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/905},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaromGLLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangL14,
  author       = {Tianwei Zhang and
                  Ruby B. Lee},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {New models of cache architectures characterizing information leakage
                  from cache side channels},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {96--105},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664273},
  doi          = {10.1145/2664243.2664273},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SzeferJPL14,
  author       = {Jakub Szefer and
                  Pramod A. Jamkhedkar and
                  Diego Perez{-}Botero and
                  Ruby B. Lee},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {Cyber defenses for physical attacks and insider threats in cloud computing},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {519--524},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590310},
  doi          = {10.1145/2590296.2590310},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SzeferJPL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotchips/Lee14,
  author       = {Ruby B. Lee},
  title        = {University research in hardware security},
  booktitle    = {2014 {IEEE} Hot Chips 26 Symposium (HCS), Cupertino, CA, USA, August
                  10-12, 2014},
  pages        = {1--27},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/HOTCHIPS.2014.7478799},
  doi          = {10.1109/HOTCHIPS.2014.7478799},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/hotchips/Lee14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotchips/Lee14a,
  author       = {Ruby B. Lee},
  title        = {Security basics},
  booktitle    = {2014 {IEEE} Hot Chips 26 Symposium (HCS), Cupertino, CA, USA, August
                  10-12, 2014},
  pages        = {1--32},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/HOTCHIPS.2014.7478795},
  doi          = {10.1109/HOTCHIPS.2014.7478795},
  timestamp    = {Sun, 19 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotchips/Lee14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotchips/LeeCDD14,
  author       = {Ruby B. Lee and
                  Vikas Chandra and
                  Leendert van Doorn and
                  David Durham},
  title        = {HotChips security tutorial},
  booktitle    = {2014 {IEEE} Hot Chips 26 Symposium (HCS), Cupertino, CA, USA, August
                  10-12, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/HOTCHIPS.2014.7478794},
  doi          = {10.1109/HOTCHIPS.2014.7478794},
  timestamp    = {Sun, 19 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotchips/LeeCDD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/LiuL14,
  author       = {Fangfei Liu and
                  Ruby B. Lee},
  title        = {Random Fill Cache Architecture},
  booktitle    = {47th Annual {IEEE/ACM} International Symposium on Microarchitecture,
                  {MICRO} 2014, Cambridge, United Kingdom, December 13-17, 2014},
  pages        = {203--215},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MICRO.2014.28},
  doi          = {10.1109/MICRO.2014.28},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/LiuL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/securecloud14/SzeferL14,
  author       = {Jakub Szefer and
                  Ruby B. Lee},
  editor       = {Sushil Jajodia and
                  Krishna Kant and
                  Pierangela Samarati and
                  Anoop Singhal and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Hardware-Enhanced Security for Cloud Computing},
  booktitle    = {Secure Cloud Computing},
  pages        = {57--76},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-9278-8\_3},
  doi          = {10.1007/978-1-4614-9278-8\_3},
  timestamp    = {Thu, 13 Feb 2020 15:16:45 +0100},
  biburl       = {https://dblp.org/rec/books/sp/securecloud14/SzeferL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2014hasp,
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765},
  doi          = {10.1145/2611765},
  isbn         = {978-1-4503-2777-0},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/2014hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/synthesis/2013Lee,
  author       = {Ruby B. Lee},
  title        = {Security Basics for Computer Architects},
  series       = {Synthesis Lectures on Computer Architecture},
  publisher    = {Morgan {\&} Claypool Publishers},
  year         = {2013},
  url          = {https://doi.org/10.2200/S00512ED1V01Y201305CAC025},
  doi          = {10.2200/S00512ED1V01Y201305CAC025},
  isbn         = {9781627051552},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/synthesis/2013Lee.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/SzeferL13,
  author       = {Jakub Szefer and
                  Ruby B. Lee},
  title        = {BitDeposit: Deterring Attacks and Abuses of Cloud Computing Services
                  through Economic Measures},
  booktitle    = {13th {IEEE/ACM} International Symposium on Cluster, Cloud, and Grid
                  Computing, CCGrid 2013, Delft, Netherlands, May 13-16, 2013},
  pages        = {630--635},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CCGrid.2013.102},
  doi          = {10.1109/CCGRID.2013.102},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/SzeferL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Perez-BoteroSL13,
  author       = {Diego Perez{-}Botero and
                  Jakub Szefer and
                  Ruby B. Lee},
  editor       = {Xingming Sun and
                  Elaine Shi and
                  Kui Ren},
  title        = {Characterizing hypervisor vulnerabilities in cloud computing servers},
  booktitle    = {Proceedings of the 2013 International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013},
  pages        = {3--10},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484402.2484406},
  doi          = {10.1145/2484402.2484406},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Perez-BoteroSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/JamkhedkarSPZTL13,
  author       = {Pramod A. Jamkhedkar and
                  Jakub Szefer and
                  Diego Perez{-}Botero and
                  Tianwei Zhang and
                  Gina Triolo and
                  Ruby B. Lee},
  title        = {A Framework for Realizing Security on Demand in Cloud Computing},
  booktitle    = {{IEEE} 5th International Conference on Cloud Computing Technology
                  and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5,
                  2013, Volume 1},
  pages        = {371--378},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CloudCom.2013.55},
  doi          = {10.1109/CLOUDCOM.2013.55},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/JamkhedkarSPZTL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ZhangLCL13,
  author       = {Tianwei Zhang and
                  Fangfei Liu and
                  Si Chen and
                  Ruby B. Lee},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side channel vulnerability metrics: the promise and the pitfalls},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487728},
  doi          = {10.1145/2487726.2487728},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ZhangLCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/LiuL13,
  author       = {Fangfei Liu and
                  Ruby B. Lee},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Security testing of a secure cache design},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487729},
  doi          = {10.1145/2487726.2487729},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/LiuL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2013hasp,
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726},
  doi          = {10.1145/2487726},
  isbn         = {978-1-4503-2118-1},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/2013hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acssc/CardarilliNFRL12,
  author       = {Gian Carlo Cardarilli and
                  Luca Di Nunzio and
                  Rocco Fazzolari and
                  Marco Re and
                  Ruby B. Lee},
  editor       = {Michael B. Matthews},
  title        = {Integration of butterfly and inverse butterfly nets in embedded processors:
                  Effects on power saving},
  booktitle    = {Conference Record of the Forty Sixth Asilomar Conference on Signals,
                  Systems and Computers, {ACSCC} 2012, Pacific Grove, CA, USA, November
                  4-7, 2012},
  pages        = {1457--1459},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ACSSC.2012.6489268},
  doi          = {10.1109/ACSSC.2012.6489268},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/acssc/CardarilliNFRL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/SzeferL12,
  author       = {Jakub Szefer and
                  Ruby B. Lee},
  editor       = {Tim Harris and
                  Michael L. Scott},
  title        = {Architectural support for hypervisor-secure virtualization},
  booktitle    = {Proceedings of the 17th International Conference on Architectural
                  Support for Programming Languages and Operating Systems, {ASPLOS}
                  2012, London, UK, March 3-7, 2012},
  pages        = {437--450},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2150976.2151022},
  doi          = {10.1145/2150976.2151022},
  timestamp    = {Wed, 07 Jul 2021 13:23:08 +0200},
  biburl       = {https://dblp.org/rec/conf/asplos/SzeferL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenJL12,
  author       = {Yu{-}Yuan Chen and
                  Pramod A. Jamkhedkar and
                  Ruby B. Lee},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {A software-hardware architecture for self-protecting data},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {14--27},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382201},
  doi          = {10.1145/2382196.2382201},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenJL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeeSS12,
  author       = {Ruby B. Lee and
                  Simha Sethumadhavan and
                  G. Edward Suh},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Hardware enhanced security},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1052},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382323},
  doi          = {10.1145/2382196.2382323},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LeeSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/SzeferJCL12,
  author       = {Jakub Szefer and
                  Pramod A. Jamkhedkar and
                  Yu{-}Yuan Chen and
                  Ruby B. Lee},
  title        = {Physical attack protection with human-secure virtualization in data
                  centers},
  booktitle    = {{IEEE/IFIP} International Conference on Dependable Systems and Networks
                  Workshops, {DSN} 2012, Boston, MA, USA, June 25-28, 2012},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/DSNW.2012.6264664},
  doi          = {10.1109/DSNW.2012.6264664},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/SzeferJCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/VishikLC12,
  author       = {Claire Vishik and
                  Ruby B. Lee and
                  Fred Chong},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Building Technologies that Help Cyber-Defense: Hardware-enabled Trust},
  booktitle    = {{ISSE} 2012 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2012 Conference, Brussels,
                  Belgium, October 23-24, 2012},
  pages        = {316--325},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-658-00333-3\_30},
  doi          = {10.1007/978-3-658-00333-3\_30},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/VishikLC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/ZhangSL12,
  author       = {Tianwei Zhang and
                  Jakub Szefer and
                  Ruby B. Lee},
  title        = {Security verification of hardware-enabled attestation protocols},
  booktitle    = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture,
                  {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December
                  1-5, 2012},
  pages        = {47--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MICROW.2012.16},
  doi          = {10.1109/MICROW.2012.16},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/ZhangSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Lee12,
  author       = {Ruby B. Lee},
  editor       = {Vijay Atluri and
                  Jaideep Vaidya and
                  Axel Kern and
                  Murat Kantarcioglu},
  title        = {Hardware-enhanced access control for cloud computing},
  booktitle    = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2295136.2295138},
  doi          = {10.1145/2295136.2295138},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/Lee12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/LanLCL11,
  author       = {Tian Lan and
                  Xiaojun Lin and
                  Mung Chiang and
                  Ruby B. Lee},
  title        = {Stability and benefits of suboptimal utility maximization},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {19},
  number       = {4},
  pages        = {1194--1207},
  year         = {2011},
  url          = {https://doi.org/10.1109/TNET.2011.2144617},
  doi          = {10.1109/TNET.2011.2144617},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/LanLCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SzeferKLR11,
  author       = {Jakub Szefer and
                  Eric Keller and
                  Ruby B. Lee and
                  Jennifer Rexford},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Eliminating the hypervisor attack surface for a more secure cloud},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {401--412},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046754},
  doi          = {10.1145/2046707.2046754},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SzeferKLR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/SzeferL11,
  author       = {Jakub Szefer and
                  Ruby B. Lee},
  title        = {A Case for Hardware Protection of Guest VMs from Compromised Hypervisors
                  in Cloud Computing},
  booktitle    = {31st {IEEE} International Conference on Distributed Computing Systems
                  Workshops {(ICDCS} 2011 Workshops), 20-24 June 2011, Minneapolis,
                  Minnesota, {USA}},
  pages        = {248--252},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICDCSW.2011.51},
  doi          = {10.1109/ICDCSW.2011.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/SzeferL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rsp/SzeferZCCCLCL11,
  author       = {Jakub Szefer and
                  Wei Zhang and
                  Yu{-}Yuan Chen and
                  David Champagne and
                  King Chan and
                  Will X. Y. Li and
                  Ray C. C. Cheung and
                  Ruby B. Lee},
  title        = {Rapid single-chip secure processor prototyping on the OpenSPARC {FPGA}
                  platform},
  booktitle    = {Proceedings of the 22nd {IEEE} International Symposium on Rapid System
                  Prototyping, {RSP} 2011, Karlsruhe, Germany, 24-27 May, 2011},
  pages        = {38--44},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/RSP.2011.5929973},
  doi          = {10.1109/RSP.2011.5929973},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/rsp/SzeferZCCCLCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/eatcs/XuDHLLC11,
  author       = {Dahai Xu and
                  Jeffrey S. Dwoskin and
                  Jianwei Huang and
                  Tian Lan and
                  Ruby B. Lee and
                  Mung Chiang},
  editor       = {Sotiris E. Nikoletseas and
                  Jos{\'{e}} D. P. Rolim},
  title        = {Key Management in Sensor Networks},
  booktitle    = {Theoretical Aspects of Distributed Computing in Sensor Networks},
  series       = {Monographs in Theoretical Computer Science. An {EATCS} Series},
  pages        = {741--785},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-14849-1\_23},
  doi          = {10.1007/978-3-642-14849-1\_23},
  timestamp    = {Mon, 19 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/eatcs/XuDHLLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DwoskinGCL10,
  author       = {Jeffrey S. Dwoskin and
                  Mahadevan Gomathisankaran and
                  Yu{-}Yuan Chen and
                  Ruby B. Lee},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {A framework for testing hardware-software security architectures},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {387--397},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920318},
  doi          = {10.1145/1920261.1920318},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DwoskinGCL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/SzeferCL10,
  author       = {Jakub Szefer and
                  Yu{-}Yuan Chen and
                  Ruby B. Lee},
  editor       = {Fran{\c{c}}ois Charot and
                  Frank Hannig and
                  J{\"{u}}rgen Teich and
                  Christophe Wolinski},
  title        = {General-purpose {FPGA} platform for efficient encryption and hashing},
  booktitle    = {21st {IEEE} International Conference on Application-specific Systems
                  Architectures and Processors, {ASAP} 2010, Rennes, France, 7-9 July
                  2010},
  pages        = {309--312},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ASAP.2010.5540976},
  doi          = {10.1109/ASAP.2010.5540976},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/SzeferCL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpca/ChampagneL10,
  author       = {David Champagne and
                  Ruby B. Lee},
  editor       = {Matthew T. Jacob and
                  Chita R. Das and
                  Pradip Bose},
  title        = {Scalable architectural support for trusted software},
  booktitle    = {16th International Conference on High-Performance Computer Architecture
                  {(HPCA-16} 2010), 9-14 January 2010, Bangalore, India},
  pages        = {1--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HPCA.2010.5416657},
  doi          = {10.1109/HPCA.2010.5416657},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpca/ChampagneL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/KellerSRL10,
  author       = {Eric Keller and
                  Jakub Szefer and
                  Jennifer Rexford and
                  Ruby B. Lee},
  editor       = {Andr{\'{e}} Seznec and
                  Uri C. Weiser and
                  Ronny Ronen},
  title        = {NoHype: virtualized cloud infrastructure without the virtualization},
  booktitle    = {37th International Symposium on Computer Architecture {(ISCA} 2010),
                  June 19-23, 2010, Saint-Malo, France},
  pages        = {350--361},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1815961.1816010},
  doi          = {10.1145/1815961.1816010},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/KellerSRL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasp/LeeC10,
  author       = {Ruby B. Lee and
                  Yu{-}Yuan Chen},
  title        = {Processor accelerator for {AES}},
  booktitle    = {{IEEE} 8th Symposium on Application Specific Processors, {SASP} 2010,
                  Anaheim, CA, USA, June 13-14, 2010},
  pages        = {16--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SASP.2010.5521153},
  doi          = {10.1109/SASP.2010.5521153},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasp/LeeC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/HilewitzL09,
  author       = {Yedidya Hilewitz and
                  Ruby B. Lee},
  title        = {A New Basis for Shifters in General-Purpose Processors for Existing
                  and Advanced Bit Manipulations},
  journal      = {{IEEE} Trans. Computers},
  volume       = {58},
  number       = {8},
  pages        = {1035--1048},
  year         = {2009},
  url          = {https://doi.org/10.1109/TC.2008.219},
  doi          = {10.1109/TC.2008.219},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/HilewitzL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/ElbazCGLPT09,
  author       = {Reouven Elbaz and
                  David Champagne and
                  Catherine H. Gebotys and
                  Ruby B. Lee and
                  Nachiketh R. Potlapally and
                  Lionel Torres},
  title        = {Hardware Mechanisms for Memory Authentication: {A} Survey of Existing
                  Techniques and Engines},
  journal      = {Trans. Comput. Sci.},
  volume       = {4},
  pages        = {1--22},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01004-0\_1},
  doi          = {10.1007/978-3-642-01004-0\_1},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcos/ElbazCGLPT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/GomathisankaranL09,
  author       = {Mahadevan Gomathisankaran and
                  Ruby B. Lee},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi},
  title        = {Tantra: {A} Fast {PRNG} Algorithm and its Implementation},
  booktitle    = {Proceedings of the 2009 International Conference on Security {\&}
                  Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {593--598},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Tue, 04 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/GomathisankaranL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LanLC09,
  author       = {Tian Lan and
                  Ruby B. Lee and
                  Mung Chiang},
  title        = {Multi-Path Key Establishment against {REM} Attacks in Wireless Ad
                  Hoc Networks},
  booktitle    = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM}
                  2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GLOCOM.2009.5426213},
  doi          = {10.1109/GLOCOM.2009.5426213},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/LanLC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChenL09,
  author       = {Yu{-}Yuan Chen and
                  Ruby B. Lee},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {Hardware-Assisted Application-Level Access Control},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {363--378},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_29},
  doi          = {10.1007/978-3-642-04474-8\_29},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ChenL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/KellerLR09,
  author       = {Eric Keller and
                  Ruby B. Lee and
                  Jennifer Rexford},
  editor       = {Guru M. Parulkar and
                  C{\'{e}}dric Westphal},
  title        = {Accountability in hosted virtual networks},
  booktitle    = {Proceedings of the 1st {ACM} {SIGCOMM} Workshop on Virtualized Infrastructure
                  Systems and Architectures, {VISA} 2009, Barcelona, Spain, August 17,
                  2009},
  pages        = {29--36},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1592648.1592654},
  doi          = {10.1145/1592648.1592654},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/KellerLR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socc/HoLSL09,
  author       = {Chun Hok Ho and
                  Wayne Luk and
                  Jakub Szefer and
                  Ruby B. Lee},
  title        = {Tuning instruction customisation for reconfigurable system-on-chip},
  booktitle    = {Annual {IEEE} International SoC Conference, SoCC 2009, September 9-11,
                  2009, Belfast, Northern Ireland, UK, Proceedings},
  pages        = {61--64},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/SOCCON.2009.5398096},
  doi          = {10.1109/SOCCON.2009.5398096},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/socc/HoLSL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LevinDBNCLIB09,
  author       = {Timothy E. Levin and
                  Jeffrey S. Dwoskin and
                  Ganesha Bhaskara and
                  Thuy D. Nguyen and
                  Paul C. Clark and
                  Ruby B. Lee and
                  Cynthia E. Irvine and
                  Terry Benzel},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Securing the Dissemination of Emergency Response Data with an Integrated
                  Hardware-Software Architecture},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {133--152},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_9},
  doi          = {10.1007/978-3-642-00587-9\_9},
  timestamp    = {Sat, 28 Aug 2021 16:06:55 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LevinDBNCLIB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/ShiYL08,
  author       = {Zhijie Jerry Shi and
                  Xiao Yang and
                  Ruby B. Lee},
  title        = {Alternative application-specific processor architectures for fast
                  arbitrary bit permutations},
  journal      = {Int. J. Embed. Syst.},
  volume       = {3},
  number       = {4},
  pages        = {219--228},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJES.2008.022393},
  doi          = {10.1504/IJES.2008.022393},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/ShiYL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/HilewitzL08,
  author       = {Yedidya Hilewitz and
                  Ruby B. Lee},
  title        = {Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for
                  Commodity Microprocessors},
  journal      = {J. Signal Process. Syst.},
  volume       = {53},
  number       = {1-2},
  pages        = {145--169},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11265-008-0212-8},
  doi          = {10.1007/S11265-008-0212-8},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vlsisp/HilewitzL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/HilewitzLL08,
  author       = {Yedidya Hilewitz and
                  C{\'{e}}dric Lauradoux and
                  Ruby B. Lee},
  title        = {Bit matrix multiplication in commodity processors},
  booktitle    = {19th {IEEE} International Conference on Application-Specific Systems,
                  Architectures and Processors, {ASAP} 2008, July 2-4, 2008, Leuven,
                  Belgium},
  pages        = {7--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ASAP.2008.4580146},
  doi          = {10.1109/ASAP.2008.4580146},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/HilewitzLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HilewitzYL08,
  author       = {Yedidya Hilewitz and
                  Yiqun Lisa Yin and
                  Ruby B. Lee},
  editor       = {Kaisa Nyberg},
  title        = {Accelerating the Whirlpool Hash Function Using Parallel Table Lookup
                  and Fast Cyclical Permutation},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {173--188},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_11},
  doi          = {10.1007/978-3-540-71039-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HilewitzYL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LanLCL08,
  author       = {Tian Lan and
                  Xiaojun Lin and
                  Mung Chiang and
                  Ruby B. Lee},
  title        = {How Bad is Suboptimal Rate Allocation?},
  booktitle    = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  13-18 April 2008, Phoenix, AZ, {USA}},
  pages        = {321--325},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/INFOCOM.2008.73},
  doi          = {10.1109/INFOCOM.2008.73},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LanLCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChampagneEL08,
  author       = {David Champagne and
                  Reouven Elbaz and
                  Ruby B. Lee},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {The Reduced Address Space {(RAS)} for Application Memory Authentication},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {47--63},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_4},
  doi          = {10.1007/978-3-540-85886-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ChampagneEL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/WangL08,
  author       = {Zhenghong Wang and
                  Ruby B. Lee},
  title        = {A novel cache architecture with enhanced performance and security},
  booktitle    = {41st Annual {IEEE/ACM} International Symposium on Microarchitecture
                  {(MICRO-41} 2008), November 8-12, 2008, Lake Como, Italy},
  pages        = {83--93},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MICRO.2008.4771781},
  doi          = {10.1109/MICRO.2008.4771781},
  timestamp    = {Tue, 31 May 2022 14:39:58 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/WangL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/ChampagneEGTL08,
  author       = {David Champagne and
                  Reouven Elbaz and
                  Catherine H. Gebotys and
                  Lionel Torres and
                  Ruby B. Lee},
  title        = {Forward-Secure Content Distribution to Reconfigurable Hardware},
  booktitle    = {ReConFig'08: 2008 International Conference on Reconfigurable Computing
                  and FPGAs, 3-5 December 2008, Cancun, Mexico, Proceedings},
  pages        = {450--455},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ReConFig.2008.51},
  doi          = {10.1109/RECONFIG.2008.51},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/ChampagneEGTL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/PotlapallyRRJL07,
  author       = {Nachiketh R. Potlapally and
                  Anand Raghunathan and
                  Srivaths Ravi and
                  Niraj K. Jha and
                  Ruby B. Lee},
  title        = {Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based
                  Analysis},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {15},
  number       = {4},
  pages        = {465--470},
  year         = {2007},
  url          = {https://doi.org/10.1109/TVLSI.2007.893665},
  doi          = {10.1109/TVLSI.2007.893665},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/PotlapallyRRJL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/PotlapallyRRLJ07,
  author       = {Nachiketh R. Potlapally and
                  Srivaths Ravi and
                  Anand Raghunathan and
                  Ruby B. Lee and
                  Niraj K. Jha},
  title        = {Configuration and Extension of Embedded Processors to Optimize IPSec
                  Protocol Execution},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {15},
  number       = {5},
  pages        = {605--609},
  year         = {2007},
  url          = {https://doi.org/10.1109/TVLSI.2007.896912},
  doi          = {10.1109/TVLSI.2007.896912},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/PotlapallyRRLJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/HilewitzL07,
  author       = {Yedidya Hilewitz and
                  Ruby B. Lee},
  title        = {Performing Advanced Bit Manipulations Efficiently in General-Purpose
                  Processors},
  booktitle    = {18th {IEEE} Symposium on Computer Arithmetic {(ARITH-18} 2007), 25-27
                  June 2007, Montpellier, France},
  pages        = {251--260},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ARITH.2007.27},
  doi          = {10.1109/ARITH.2007.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/HilewitzL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/JosephsonLL07,
  author       = {William Josephson and
                  Ruby B. Lee and
                  Kai Li},
  title        = {{ISA} Support for Fingerprinting and Erasure Codes},
  booktitle    = {{IEEE} International Conference on Application-Specific Systems, Architectures
                  and Processors, {ASAP} 2007, Montr{\'{e}}al, Qu{\'{e}}bec,
                  Canada, July 8-11, 2007},
  pages        = {415--422},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ASAP.2007.4459299},
  doi          = {10.1109/ASAP.2007.4459299},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/JosephsonLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DwoskinL07,
  author       = {Jeffrey S. Dwoskin and
                  Ruby B. Lee},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Hardware-rooted trust for secure key management and transient trust},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {389--400},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315294},
  doi          = {10.1145/1315245.1315294},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DwoskinL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ElbazCLTSG07,
  author       = {Reouven Elbaz and
                  David Champagne and
                  Ruby B. Lee and
                  Lionel Torres and
                  Gilles Sassatelli and
                  Pierre Guillemin},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {TEC-Tree: {A} Low-Cost, Parallelizable Tree for Efficient Defense
                  Against Memory Replay Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {289--302},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_20},
  doi          = {10.1007/978-3-540-74735-2\_20},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ElbazCLTSG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/DwoskinXHCL07,
  author       = {Jeffrey S. Dwoskin and
                  Dahai Xu and
                  Jianwei Huang and
                  Mung Chiang and
                  Ruby B. Lee},
  title        = {Secure Key Management Architecture Against Sensor-Node Fabrication
                  Attacks},
  booktitle    = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM}
                  '07, Washington, DC, USA, 26-30 November 2007},
  pages        = {166--171},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/GLOCOM.2007.39},
  doi          = {10.1109/GLOCOM.2007.39},
  timestamp    = {Mon, 19 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/DwoskinXHCL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangDL07,
  author       = {Zhenghong Wang and
                  Jing Deng and
                  Ruby B. Lee},
  title        = {Mutual Anonymous Communications: {A} New Covert Channel Based on Splitting
                  Tree {MAC}},
  booktitle    = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  6-12 May 2007, Anchorage, Alaska, {USA}},
  pages        = {2531--2535},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/INFCOM.2007.315},
  doi          = {10.1109/INFCOM.2007.315},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/WangDL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/WangL07,
  author       = {Zhenghong Wang and
                  Ruby B. Lee},
  editor       = {Dean M. Tullsen and
                  Brad Calder},
  title        = {New cache designs for thwarting software cache-based side channel
                  attacks},
  booktitle    = {34th International Symposium on Computer Architecture {(ISCA} 2007),
                  June 9-13, 2007, San Diego, California, {USA}},
  pages        = {494--505},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1250662.1250723},
  doi          = {10.1145/1250662.1250723},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/WangL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/XuHDCL07,
  author       = {Dahai Xu and
                  Jianwei Huang and
                  Jeffrey S. Dwoskin and
                  Mung Chiang and
                  Ruby B. Lee},
  title        = {Re-examining Probabilistic Versus Deterministic Key Management},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2007,
                  Nice, France, June 24-29, 2007},
  pages        = {2586--2590},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISIT.2007.4557608},
  doi          = {10.1109/ISIT.2007.4557608},
  timestamp    = {Mon, 19 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/XuHDCL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangL06,
  author       = {Zhenghong Wang and
                  Ruby B. Lee},
  title        = {Covert and Side Channels Due to Processor Architecture},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {473--482},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.20},
  doi          = {10.1109/ACSAC.2006.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/HilewitzL06,
  author       = {Yedidya Hilewitz and
                  Ruby B. Lee},
  title        = {Fast Bit Compression and Expansion with Parallel Extract and Parallel
                  Deposit Instructions},
  booktitle    = {2006 {IEEE} International Conference on Application-Specific Systems,
                  Architecture and Processors {(ASAP} 2006), 11-13 September 2006, Steamboat
                  Springs, Colorado, {USA}},
  pages        = {65--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ASAP.2006.33},
  doi          = {10.1109/ASAP.2006.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/HilewitzL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/PotlapallyRRJL06,
  author       = {Nachiketh R. Potlapally and
                  Anand Raghunathan and
                  Srivaths Ravi and
                  Niraj K. Jha and
                  Ruby B. Lee},
  editor       = {Georges G. E. Gielen},
  title        = {Satisfiability-based framework for enabling side-channel attacks on
                  cryptographic software},
  booktitle    = {Proceedings of the Conference on Design, Automation and Test in Europe:
                  Designers' Forum, {DATE} 2006, Munich, Germany, March 6-10, 2006},
  pages        = {18--23},
  publisher    = {European Design and Automation Association, Leuven, Belgium},
  year         = {2006},
  url          = {https://doi.org/10.1109/DATE.2006.244158},
  doi          = {10.1109/DATE.2006.244158},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/PotlapallyRRJL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsid/PotlapallyRRLJ06,
  author       = {Nachiketh R. Potlapally and
                  Srivaths Ravi and
                  Anand Raghunathan and
                  Ruby B. Lee and
                  Niraj K. Jha},
  title        = {Impact of Configurability and Extensibility on IPSec Protocol Execution
                  on Embedded Processors},
  booktitle    = {19th International Conference on {VLSI} Design {(VLSI} Design 2006),
                  3-7 January 2006, Hyderabad, India},
  pages        = {299--304},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/VLSID.2006.102},
  doi          = {10.1109/VLSID.2006.102},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vlsid/PotlapallyRRLJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/LeeYS05,
  author       = {Ruby B. Lee and
                  Xiao Yang and
                  Zhijie Shi},
  title        = {Single-Cycle Bit Permutations with {MOMR} Execution},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {20},
  number       = {5},
  pages        = {577--585},
  year         = {2005},
  url          = {https://doi.org/10.1007/s11390-005-0577-0},
  doi          = {10.1007/S11390-005-0577-0},
  timestamp    = {Wed, 20 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/LeeYS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigarch/McGregorL05,
  author       = {John Patrick McGregor and
                  Ruby B. Lee},
  title        = {Protecting cryptographic keys and computations via virtual secure
                  coprocessing},
  journal      = {{SIGARCH} Comput. Archit. News},
  volume       = {33},
  number       = {1},
  pages        = {16--26},
  year         = {2005},
  url          = {https://doi.org/10.1145/1055626.1055630},
  doi          = {10.1145/1055626.1055630},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigarch/McGregorL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/LeeF05,
  author       = {Ruby B. Lee and
                  A. Murat Fiskiran},
  title        = {{PLX:} An Instruction Set Architecture and Testbed for Multimedia
                  Information Processing},
  journal      = {J. {VLSI} Signal Process.},
  volume       = {40},
  number       = {1},
  pages        = {85--108},
  year         = {2005},
  url          = {https://doi.org/10.1007/s11265-005-4940-8},
  doi          = {10.1007/S11265-005-4940-8},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vlsisp/LeeF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aPcsac/Lee05,
  author       = {Ruby B. Lee},
  editor       = {Thambipillai Srikanthan and
                  Jingling Xue and
                  Chip{-}Hong Chang},
  title        = {Processor Architecture for Trustworthy Computers},
  booktitle    = {Advances in Computer Systems Architecture, 10th Asia-Pacific Conference,
                  {ACSAC} 2005, Singapore, October 24-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3740},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11572961\_1},
  doi          = {10.1007/11572961\_1},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/aPcsac/Lee05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/McGregorYL05,
  author       = {John Patrick McGregor and
                  Yiqun Lisa Yin and
                  Ruby B. Lee},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {A Traitor Tracing Scheme Based on {RSA} for Fast Decryption},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {56--74},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_5},
  doi          = {10.1007/11496137\_5},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/McGregorYL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/FiskiranL05,
  author       = {A. Murat Fiskiran and
                  Ruby B. Lee},
  title        = {On-Chip Lookup Tables for Fast Symmetric-Key Encryption},
  booktitle    = {16th {IEEE} International Conference on Application-Specific Systems,
                  Architectures, and Processors {(ASAP} 2005), 23-25 July 2005, Samos,
                  Greece},
  pages        = {356--363},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ASAP.2005.49},
  doi          = {10.1109/ASAP.2005.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/FiskiranL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/WangL05,
  author       = {Zhenghong Wang and
                  Ruby B. Lee},
  title        = {Capacity Estimation of Non-Synchronous Covert Channels},
  booktitle    = {25th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}},
  pages        = {170--176},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDCSW.2005.47},
  doi          = {10.1109/ICDCSW.2005.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/WangL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/LeeKMDW05,
  author       = {Ruby B. Lee and
                  Peter C. S. Kwan and
                  John Patrick McGregor and
                  Jeffrey S. Dwoskin and
                  Zhenghong Wang},
  title        = {Architecture for Protecting Critical Secrets in Microprocessors},
  booktitle    = {32st International Symposium on Computer Architecture {(ISCA} 2005),
                  4-8 June 2005, Madison, Wisconsin, {USA}},
  pages        = {2--13},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISCA.2005.14},
  doi          = {10.1109/ISCA.2005.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/LeeKMDW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangL05,
  author       = {Zhenghong Wang and
                  Ruby B. Lee},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {New Constructive Approach to Covert Channel Modeling and Channel Capacity
                  Estimation},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {498--505},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_37},
  doi          = {10.1007/11556992\_37},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WangL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/FiskiranL05,
  author       = {A. Murat Fiskiran and
                  Ruby B. Lee},
  title        = {Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography},
  booktitle    = {International Symposium on Information Technology: Coding and Computing
                  {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}},
  pages        = {526--531},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITCC.2005.151},
  doi          = {10.1109/ITCC.2005.151},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/FiskiranL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ISCApdcs/SpechtL04,
  author       = {Stephen M. Specht and
                  Ruby B. Lee},
  editor       = {David A. Bader and
                  Ashfaq A. Khokhar},
  title        = {Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures},
  booktitle    = {Proceedings of the {ISCA} 17th International Conference on Parallel
                  and Distributed Computing Systems, September 15-17, 2004, The Canterbury
                  Hotel, San Francisco, California, {USA}},
  pages        = {543--550},
  publisher    = {{ISCA}},
  year         = {2004},
  timestamp    = {Mon, 09 Aug 2021 16:35:42 +0200},
  biburl       = {https://dblp.org/rec/conf/ISCApdcs/SpechtL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aPcsac/LeeYS04,
  author       = {Ruby B. Lee and
                  Xiao Yang and
                  Zhijie Shi},
  editor       = {Pen{-}Chung Yew and
                  Jingling Xue},
  title        = {Validating Word-Oriented Processors for Bit and Multi-word Operations},
  booktitle    = {Advances in Computer Systems Architecture, 9th Asia-Pacific Conference,
                  {ACSAC} 2004, Beijing, China, September 7-9, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3189},
  pages        = {473--488},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30102-8\_40},
  doi          = {10.1007/978-3-540-30102-8\_40},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/aPcsac/LeeYS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/FiskiranL04,
  author       = {A. Murat Fiskiran and
                  Ruby B. Lee},
  title        = {Evaluating Instruction Set Extensions for Fast Arithmetic on Binary
                  Finite Fields},
  booktitle    = {15th {IEEE} International Conference on Application-Specific Systems,
                  Architectures, and Processors {(ASAP} 2004), 27-29 September 2004,
                  Galveston, TX, {USA}},
  pages        = {125--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ASAP.2004.10003},
  doi          = {10.1109/ASAP.2004.10003},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/FiskiranL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/RaviKLMR04,
  author       = {Srivaths Ravi and
                  Paul C. Kocher and
                  Ruby B. Lee and
                  Gary McGraw and
                  Anand Raghunathan},
  editor       = {Sharad Malik and
                  Limor Fix and
                  Andrew B. Kahng},
  title        = {Security as a new dimension in embedded system design},
  booktitle    = {Proceedings of the 41th Design Automation Conference, {DAC} 2004,
                  San Diego, CA, USA, June 7-11, 2004},
  pages        = {753--760},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/996566.996771},
  doi          = {10.1145/996566.996771},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dac/RaviKLMR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/FiskiranL04,
  author       = {A. Murat Fiskiran and
                  Ruby B. Lee},
  title        = {Runtime Execution Monitoring {(REM)} to Detect and Prevent Malicious
                  Code Execution},
  booktitle    = {22nd {IEEE} International Conference on Computer Design: {VLSI} in
                  Computers {\&} Processors {(ICCD} 2004), 11-13 October 2004, San
                  Jose, CA, USA, Proceedings},
  pages        = {452--457},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICCD.2004.1347961},
  doi          = {10.1109/ICCD.2004.1347961},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/FiskiranL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/YangL04,
  author       = {Xiao Yang and
                  Ruby B. Lee},
  title        = {{PLX} {FP:} an efficient floating-point instruction set for 3D graphics},
  booktitle    = {Proceedings of the 2004 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2004, 27-30 June 2004, Taipei, Taiwan},
  pages        = {137--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs/YangL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/LeeSYRR04,
  author       = {Ruby B. Lee and
                  Zhijie Shi and
                  Yiqun Lisa Yin and
                  Ronald L. Rivest and
                  Matthew J. B. Robshaw},
  title        = {On Permutation Operations in Cipher Design},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {569--577},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286714},
  doi          = {10.1109/ITCC.2004.1286714},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/LeeSYRR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/MooreRLB03,
  author       = {Charles R. Moore and
                  Kevin W. Rudd and
                  Ruby B. Lee and
                  Pradip Bose},
  title        = {Guest Editors' Introduction: Micro's Top Picks from Microarchitecture
                  Conferences},
  journal      = {{IEEE} Micro},
  volume       = {23},
  number       = {6},
  pages        = {8--10},
  year         = {2003},
  url          = {https://doi.org/10.1109/MM.2003.1261381},
  doi          = {10.1109/MM.2003.1261381},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/micro/MooreRLB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/McGregorL03,
  author       = {John Patrick McGregor and
                  Ruby B. Lee},
  title        = {Architectural techniques for accelerating subword permutations with
                  repetitions},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {11},
  number       = {3},
  pages        = {325--335},
  year         = {2003},
  url          = {https://doi.org/10.1109/TVLSI.2003.812318},
  doi          = {10.1109/TVLSI.2003.812318},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvlsi/McGregorL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/Lee03,
  author       = {Ruby B. Lee},
  title        = {Challenges in the Design of Security-Aware Processors},
  booktitle    = {14th {IEEE} International Conference on Application-Specific Systems,
                  Architectures, and Processors {(ASAP} 2003), 24-26 June 2003, The
                  Hague, The Netherlands},
  pages        = {2},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ASAP.2003.1212824},
  doi          = {10.1109/ASAP.2003.1212824},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/Lee03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/ShiYL03,
  author       = {Zhijie Shi and
                  Xiao Yang and
                  Ruby B. Lee},
  title        = {Arbitrary Bit Permutations in One or Two Cycles},
  booktitle    = {14th {IEEE} International Conference on Application-Specific Systems,
                  Architectures, and Processors {(ASAP} 2003), 24-26 June 2003, The
                  Hague, The Netherlands},
  pages        = {237},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ASAP.2003.1212847},
  doi          = {10.1109/ASAP.2003.1212847},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/ShiYL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/LeeKMS03,
  author       = {Ruby B. Lee and
                  David K. Karig and
                  John Patrick McGregor and
                  Zhijie Shi},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Enlisting Hardware Architecture to Thwart Malicious Code Injection},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {237--252},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_21},
  doi          = {10.1007/978-3-540-39881-3\_21},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/LeeKMS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/LeeFSY02,
  author       = {Ruby B. Lee and
                  A. Murat Fiskiran and
                  Zhijie Shi and
                  Xiao Yang},
  title        = {Refining Instruction Set Architecture for High-Performance Multimedia
                  Processing in Constrained Environments},
  booktitle    = {13th {IEEE} International Conference on Application-Specific Systems,
                  Architectures, and Processors {(ASAP} 2002), 17-19 July 2002, San
                  Jose, CA, {USA}},
  pages        = {253--264},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ASAP.2002.1030724},
  doi          = {10.1109/ASAP.2002.1030724},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/LeeFSY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/ShiL02,
  author       = {Zhijie Shi and
                  Ruby B. Lee},
  title        = {Subword Sorting with Versatile Permutation Instructions},
  booktitle    = {20th International Conference on Computer Design {(ICCD} 2002), {VLSI}
                  in Computers and Processors, 16-18 September 2002, Freiburg, Germany,
                  Proceedings},
  pages        = {234--241},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICCD.2002.1106776},
  doi          = {10.1109/ICCD.2002.1106776},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/ShiL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/LeeF02,
  author       = {Ruby B. Lee and
                  A. Murat Fiskiran},
  title        = {{PLX:} a fully subword-parallel instruction set architecture for fast
                  scalable multimedia processing},
  booktitle    = {Proceedings of the 2002 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2002, Lausanne, Switzerland. August 26-29, 2002.
                  Volume {II}},
  pages        = {117--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICME.2002.1035526},
  doi          = {10.1109/ICME.2002.1035526},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/LeeF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/LeeSY01,
  author       = {Ruby B. Lee and
                  Zhijie Shi and
                  Xiao Yang},
  title        = {Cryptography Efficient Permutation Instructions for Fast Software},
  journal      = {{IEEE} Micro},
  volume       = {21},
  number       = {6},
  pages        = {56--69},
  year         = {2001},
  url          = {https://doi.org/10.1109/40.977759},
  doi          = {10.1109/40.977759},
  timestamp    = {Wed, 20 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/micro/LeeSY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/Lee01,
  author       = {Ruby B. Lee},
  title        = {Computer Arithmetic-A Processor Architect's Perspective},
  booktitle    = {15th {IEEE} Symposium on Computer Arithmetic (Arith-15 2001), 11-17
                  June 2001, Vail, CO, {USA}},
  pages        = {3},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ARITH.2001.10003},
  doi          = {10.1109/ARITH.2001.10003},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/Lee01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/McGregorL01,
  author       = {John Patrick McGregor and
                  Ruby B. Lee},
  title        = {Architectural Enhancements for Fast Subword Permutations with Repetitions
                  in Cryptographic Applications},
  booktitle    = {19th International Conference on Computer Design {(ICCD} 2001), {VLSI}
                  in Computers and Processors, 23-26 September 2001, Austin, TX, USA,
                  Proceedings},
  pages        = {453--461},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICCD.2001.955065},
  doi          = {10.1109/ICCD.2001.955065},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/McGregorL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/FiskiranL01,
  author       = {A. Murat Fiskiran and
                  Ruby B. Lee},
  title        = {Performance Impact of Addressing Modes on Encryption Algorithms},
  booktitle    = {19th International Conference on Computer Design {(ICCD} 2001), {VLSI}
                  in Computers and Processors, 23-26 September 2001, Austin, TX, USA,
                  Proceedings},
  pages        = {542--545},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICCD.2001.955088},
  doi          = {10.1109/ICCD.2001.955088},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/FiskiranL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/LeeFB01,
  author       = {Ruby B. Lee and
                  A. Murat Fiskiran and
                  Abdulla Bubsha},
  title        = {Multimedia Instructions In {IA-64}},
  booktitle    = {Proceedings of the 2001 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2001, August 22-25, 2001, Tokyo, Japan},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICME.2001.1237694},
  doi          = {10.1109/ICME.2001.1237694},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/LeeFB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/ZuckerLF00,
  author       = {Daniel F. Zucker and
                  Ruby B. Lee and
                  Michael J. Flynn},
  title        = {Hardware and software cache prefetching techniques for {MPEG} benchmarks},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {10},
  number       = {5},
  pages        = {782--796},
  year         = {2000},
  url          = {https://doi.org/10.1109/76.856455},
  doi          = {10.1109/76.856455},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/ZuckerLF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/Lee00,
  author       = {Ruby B. Lee},
  title        = {Subword Permutation Instructions for Two-Dimensional Multimedia Processing
                  in MicroSIMD Architectures},
  booktitle    = {12th {IEEE} International Conference on Application-Specific Systems,
                  Architectures, and Processors {(ASAP} 2000), 10-12 July 2000, Boston,
                  MA, {USA}},
  pages        = {3--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ASAP.2000.862373},
  doi          = {10.1109/ASAP.2000.862373},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/Lee00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/ShiL00,
  author       = {Zhijie Shi and
                  Ruby B. Lee},
  title        = {Bit Permutation Instructions for Accelerating Software Cryptography},
  booktitle    = {12th {IEEE} International Conference on Application-Specific Systems,
                  Architectures, and Processors {(ASAP} 2000), 10-12 July 2000, Boston,
                  MA, {USA}},
  pages        = {138--148},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ASAP.2000.862385},
  doi          = {10.1109/ASAP.2000.862385},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/ShiL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/YangL00,
  author       = {Xiao Yang and
                  Ruby B. Lee},
  title        = {Fast Subword Permutation Instructions Using Omega and Flip Network
                  Stages},
  booktitle    = {Proceedings of the {IEEE} International Conference On Computer Design:
                  {VLSI} In Computers {\&} Processors, {ICCD} '00, Austin, Texas,
                  USA, September 17-20, 2000},
  pages        = {15--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICCD.2000.878264},
  doi          = {10.1109/ICCD.2000.878264},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/YangL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/LuoL00,
  author       = {Zhen Luo and
                  Ruby B. Lee},
  title        = {Cost-effective multiplication with enhanced adders for multimedia
                  applications},
  booktitle    = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2000,
                  Emerging Technologies for the 21st Century, Geneva, Switzerland, 28-31
                  May 2000, Proceedings},
  pages        = {651--654},
  publisher    = {{IEEE}},
  year         = {2000},
  url          = {https://doi.org/10.1109/ISCAS.2000.857179},
  doi          = {10.1109/ISCAS.2000.857179},
  timestamp    = {Fri, 13 Aug 2021 09:26:01 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/LuoL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/McGregorL00,
  author       = {John Patrick McGregor and
                  Ruby B. Lee},
  title        = {Performance Impact of Data Compression on Virtual Private Network
                  Transactions},
  booktitle    = {Proceedings 27th Conference on Local Computer Networks, Tampa, Florida,
                  USA, 8-10 November, 2000},
  pages        = {500--510},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/LCN.2000.891091},
  doi          = {10.1109/LCN.2000.891091},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/McGregorL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ZuckerLFF98,
  author       = {Daniel F. Zucker and
                  Ruby B. Lee and
                  Michael J. Flynn},
  title        = {An Automated Method for Software Controlled Cache Prefetching},
  booktitle    = {Thirty-First Annual Hawaii International Conference on System Sciences,
                  Kohala Coast, Hawaii, USA, January 6-9, 1998},
  pages        = {106--114},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/HICSS.1998.649189},
  doi          = {10.1109/HICSS.1998.649189},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/ZuckerLFF98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ConteDJLPRSSW97,
  author       = {Thomas M. Conte and
                  Pradeep K. Dubey and
                  Matthew D. Jennings and
                  Ruby B. Lee and
                  Alex Peleg and
                  Salliah Rathnam and
                  Michael S. Schlansker and
                  Peter Song and
                  Andrew Wolfe},
  title        = {Challenges to Combining General-Purpose and Multimedia Processors},
  journal      = {Computer},
  volume       = {30},
  number       = {12},
  pages        = {33--37},
  year         = {1997},
  url          = {https://doi.org/10.1109/2.642799},
  doi          = {10.1109/2.642799},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ConteDJLPRSSW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compcon/YuLF97,
  author       = {Alice Yu and
                  Ruby B. Lee and
                  Michael J. Flynn},
  title        = {An evaluation of video fidelity metrics},
  booktitle    = {Proceedings {IEEE} {COMPCON} 97, San Jose, California, USA, February
                  23-26, 1997, Digest of Papers},
  pages        = {49--55},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CMPCON.1997.584670},
  doi          = {10.1109/CMPCON.1997.584670},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compcon/YuLF97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compcon/WongTHML97,
  author       = {Ping Wah Wong and
                  Daniel Tretter and
                  Cormac Herley and
                  Nader Moayeri and
                  Ruby B. Lee},
  title        = {Image processing considerations for digital photography},
  booktitle    = {Proceedings {IEEE} {COMPCON} 97, San Jose, California, USA, February
                  23-26, 1997, Digest of Papers},
  pages        = {280--285},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CMPCON.1997.584730},
  doi          = {10.1109/CMPCON.1997.584730},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compcon/WongTHML97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/YuLF97,
  author       = {Alice Yu and
                  Ruby B. Lee and
                  Michael J. Flynn},
  editor       = {Ephraim P. Glinert and
                  Mark Scott Johnson and
                  Jim Foley and
                  Jim Hollan},
  title        = {Performance Enhancement of {H.263} Encoder Based on Zero Coefficient
                  Prediction},
  booktitle    = {Proceedings of the Fifth {ACM} International Conference on Multimedia
                  '97, Seattle, WA, USA, November 9-13, 1997},
  pages        = {21--29},
  publisher    = {{ACM} Press},
  year         = {1997},
  url          = {https://doi.org/10.1145/266180.266326},
  doi          = {10.1145/266180.266326},
  timestamp    = {Wed, 21 Jul 2021 12:11:06 +0200},
  biburl       = {https://dblp.org/rec/conf/mm/YuLF97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/LeeS96,
  author       = {Ruby B. Lee and
                  Michael D. Smith},
  title        = {Guest Editorial: Media processing: a new design target},
  journal      = {{IEEE} Micro},
  volume       = {16},
  number       = {4},
  pages        = {6--9},
  year         = {1996},
  url          = {https://doi.org/10.1109/MM.1996.526920},
  doi          = {10.1109/MM.1996.526920},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/micro/LeeS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/Lee96,
  author       = {Ruby B. Lee},
  title        = {Subword parallelism with {MAX-2}},
  journal      = {{IEEE} Micro},
  volume       = {16},
  number       = {4},
  pages        = {51--59},
  year         = {1996},
  url          = {https://doi.org/10.1109/40.526925},
  doi          = {10.1109/40.526925},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/micro/Lee96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compcon/LeeH96,
  author       = {Ruby B. Lee and
                  Jerome C. Huck},
  title        = {64-bit and Multimedia Extensions in the {PA-RISC} 2.0 Architecture},
  booktitle    = {Forty-First {IEEE} Computer Society International Conference: Technologies
                  for the Information Superhighway, {COMPCON} 1996, Santa Clara, California,
                  USA, February 25-28, 1996, Digest of Papers},
  pages        = {152--160},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CMPCON.1996.501762},
  doi          = {10.1109/CMPCON.1996.501762},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compcon/LeeH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compcon/ZuckerFL96,
  author       = {Daniel F. Zucker and
                  Michael J. Flynn and
                  Ruby B. Lee},
  title        = {Improving Performance for {MPEG} Players},
  booktitle    = {Forty-First {IEEE} Computer Society International Conference: Technologies
                  for the Information Superhighway, {COMPCON} 1996, Santa Clara, California,
                  USA, February 25-28, 1996, Digest of Papers},
  pages        = {327--332},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CMPCON.1996.501791},
  doi          = {10.1109/CMPCON.1996.501791},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compcon/ZuckerFL96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/ZuckerFL96,
  author       = {Daniel F. Zucker and
                  Michael J. Flynn and
                  Ruby B. Lee},
  title        = {A Comparison of Hardware Prefetching Techniques for Mulimedia Benchmarks},
  booktitle    = {Proceedings of the {IEEE} International Conference on Multimedia Computing
                  and Systems, {ICMCS} 1996, Hiroshima, Japan, June 17-23, 1996},
  pages        = {236--244},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/MMCS.1996.534981},
  doi          = {10.1109/MMCS.1996.534981},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/ZuckerFL96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/Lee95,
  author       = {Ruby B. Lee},
  title        = {Accelerating multimedia with enhanced microprocessors},
  journal      = {{IEEE} Micro},
  volume       = {15},
  number       = {2},
  pages        = {22--32},
  year         = {1995},
  url          = {https://doi.org/10.1109/40.372347},
  doi          = {10.1109/40.372347},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/micro/Lee95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/BhaskaranKLB95,
  author       = {Vasudev Bhaskaran and
                  Konstantine Konstantinides and
                  Ruby B. Lee and
                  John P. Beck},
  title        = {Algorithmic and architectural enhancements for real-time {MPEG-1}
                  decoding on a general purpose {RISC} workstation},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {5},
  number       = {5},
  pages        = {380--386},
  year         = {1995},
  url          = {https://doi.org/10.1109/76.473548},
  doi          = {10.1109/76.473548},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/BhaskaranKLB95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compcon/Lee95,
  author       = {Ruby B. Lee},
  title        = {Realtime {MPEG} Video via Software Decompression oon a {PA-RISC} Processor},
  booktitle    = {{COMPCON} '95: Technologies for the Information Superhighway, Digest
                  of Papers, San Francisco, California, USA, March 5-9, 1995},
  pages        = {186--192},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/CMPCON.1995.512384},
  doi          = {10.1109/CMPCON.1995.512384},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compcon/Lee95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Lee89,
  author       = {Ruby B. Lee},
  title        = {Precision Architecture},
  journal      = {Computer},
  volume       = {22},
  number       = {1},
  pages        = {78--91},
  year         = {1989},
  url          = {https://doi.org/10.1109/2.19825},
  doi          = {10.1109/2.19825},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Lee89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics