Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ruby B. Lee
@inproceedings{DBLP:conf/codaspy/HeHL23, author = {Zecheng He and Guangyuan Hu and Ruby B. Lee}, editor = {Mohamed Shehab and Maribel Fern{\'{a}}ndez and Ninghui Li}, title = {CloudShield: Real-time Anomaly Detection in the Cloud}, booktitle = {Proceedings of the Thirteenth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26, 2023}, pages = {91--102}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577923.3583639}, doi = {10.1145/3577923.3583639}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/HeHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-03724, author = {Guangyuan Hu and Zecheng He and Ruby B. Lee}, title = {SoK: Hardware Defenses Against Speculative Execution Attacks}, journal = {CoRR}, volume = {abs/2301.03724}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.03724}, doi = {10.48550/ARXIV.2301.03724}, eprinttype = {arXiv}, eprint = {2301.03724}, timestamp = {Thu, 19 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-03724.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-00732, author = {Guangyuan Hu and Ruby B. Lee}, title = {Protecting Cache States Against Both Speculative Execution Attacks and Side-channel Attacks}, journal = {CoRR}, volume = {abs/2302.00732}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.00732}, doi = {10.48550/ARXIV.2302.00732}, eprinttype = {arXiv}, eprint = {2302.00732}, timestamp = {Thu, 09 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-00732.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-16172, author = {Guangyuan Hu and Ruby B. Lee}, title = {Random and Safe Cache Architecture to Defeat Cache Timing Attacks}, journal = {CoRR}, volume = {abs/2309.16172}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.16172}, doi = {10.48550/ARXIV.2309.16172}, eprinttype = {arXiv}, eprint = {2309.16172}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-16172.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HeZL21, author = {Zecheng He and Tianwei Zhang and Ruby B. Lee}, title = {Attacking and Protecting Data Privacy in Edge-Cloud Collaborative Inference Systems}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {12}, pages = {9706--9716}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3022358}, doi = {10.1109/JIOT.2020.3022358}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/HeZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/HeSZXLWSLC21, author = {Zecheng He and Srinivas Sunkara and Xiaoxue Zang and Ying Xu and Lijuan Liu and Nevan Wichers and Gabriel Schubiner and Ruby B. Lee and Jindong Chen}, title = {ActionBert: Leveraging User Actions for Semantic Understanding of User Interfaces}, booktitle = {Thirty-Fifth {AAAI} Conference on Artificial Intelligence, {AAAI} 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2021, Virtual Event, February 2-9, 2021}, pages = {5931--5938}, publisher = {{AAAI} Press}, year = {2021}, url = {https://doi.org/10.1609/aaai.v35i7.16741}, doi = {10.1609/AAAI.V35I7.16741}, timestamp = {Mon, 04 Sep 2023 12:29:24 +0200}, biburl = {https://dblp.org/rec/conf/aaai/HeSZXLWSLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Lee21, author = {Ruby B. Lee}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Stefan Katzenbeisser and Debdeep Mukhopadhyay}, title = {Speculative Execution Attacks and Hardware Defenses}, booktitle = {ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, Virtual Event, Republic of Korea, 19 November 2021}, pages = {3}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474376.3487404}, doi = {10.1145/3474376.3487404}, timestamp = {Thu, 11 Nov 2021 09:27:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Lee21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpca/HeHL21, author = {Zecheng He and Guangyuan Hu and Ruby B. Lee}, title = {New Models for Understanding and Reasoning about Speculative Execution Attacks}, booktitle = {{IEEE} International Symposium on High-Performance Computer Architecture, {HPCA} 2021, Seoul, South Korea, February 27 - March 3, 2021}, pages = {40--53}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/HPCA51647.2021.00014}, doi = {10.1109/HPCA51647.2021.00014}, timestamp = {Tue, 27 Apr 2021 14:46:03 +0200}, biburl = {https://dblp.org/rec/conf/hpca/HeHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/0004JL21, author = {Tianwei Zhang and Jakub Szefer and Ruby B. Lee}, title = {Practical and Scalable Security Verification of Secure Architectures}, booktitle = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, pages = {2:1--2:9}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253.3505256}, doi = {10.1145/3505253.3505256}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/0004JL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seed/HuHL21, author = {Guangyuan Hu and Zecheng He and Ruby B. Lee}, title = {SoK: Hardware Defenses Against Speculative Execution Attacks}, booktitle = {2021 International Symposium on Secure and Private Execution Environment Design (SEED), Washington, DC, USA, September 20-21, 2021}, pages = {108--120}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SEED51797.2021.00023}, doi = {10.1109/SEED51797.2021.00023}, timestamp = {Tue, 08 Nov 2022 13:30:39 +0100}, biburl = {https://dblp.org/rec/conf/seed/HuHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-06453, author = {Guangyuan Hu and Zecheng He and Ruby B. Lee}, title = {Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support}, journal = {CoRR}, volume = {abs/2103.06453}, year = {2021}, url = {https://arxiv.org/abs/2103.06453}, eprinttype = {arXiv}, eprint = {2103.06453}, timestamp = {Tue, 16 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-06453.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-08977, author = {Zecheng He and Ruby B. Lee}, title = {CloudShield: Real-time Anomaly Detection in the Cloud}, journal = {CoRR}, volume = {abs/2108.08977}, year = {2021}, url = {https://arxiv.org/abs/2108.08977}, eprinttype = {arXiv}, eprint = {2108.08977}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-08977.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/Hu0L20, author = {Guangyuan Hu and Tianwei Zhang and Ruby B. Lee}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {6:1--6:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458909}, doi = {10.1145/3458903.3458909}, timestamp = {Tue, 26 Oct 2021 15:43:33 +0200}, biburl = {https://dblp.org/rec/conf/micro/Hu0L20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/micro/2020hasp, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903}, doi = {10.1145/3458903}, isbn = {978-1-4503-8898-6}, timestamp = {Tue, 26 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/2020hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-03914, author = {Guangyuan Hu and Zecheng He and Ruby B. Lee}, title = {Smartphone Impostor Detection with Built-in Sensors and Deep Learning}, journal = {CoRR}, volume = {abs/2002.03914}, year = {2020}, url = {https://arxiv.org/abs/2002.03914}, eprinttype = {arXiv}, eprint = {2002.03914}, timestamp = {Wed, 12 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-03914.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-07998, author = {Zecheng He and Guangyuan Hu and Ruby B. Lee}, title = {New Models for Understanding and Reasoning about Speculative Execution Attacks}, journal = {CoRR}, volume = {abs/2009.07998}, year = {2020}, url = {https://arxiv.org/abs/2009.07998}, eprinttype = {arXiv}, eprint = {2009.07998}, timestamp = {Wed, 23 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-07998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-12350, author = {Zecheng He and Srinivas Sunkara and Xiaoxue Zang and Ying Xu and Lijuan Liu and Nevan Wichers and Gabriel Schubiner and Ruby B. Lee and Jindong Chen}, title = {ActionBert: Leveraging User Actions for Semantic Understanding of User Interfaces}, journal = {CoRR}, volume = {abs/2012.12350}, year = {2020}, url = {https://arxiv.org/abs/2012.12350}, eprinttype = {arXiv}, eprint = {2012.12350}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-12350.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HeZL19, author = {Zecheng He and Tianwei Zhang and Ruby B. Lee}, editor = {David Balenson}, title = {Model inversion attacks against collaborative inference}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {148--162}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359824}, doi = {10.1145/3359789.3359824}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HeZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/HeZL19, author = {Zecheng He and Tianwei Zhang and Ruby B. Lee}, title = {Sensitive-Sample Fingerprinting of Deep Neural Networks}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2019, Long Beach, CA, USA, June 16-20, 2019}, pages = {4729--4737}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2019}, url = {http://openaccess.thecvf.com/content\_CVPR\_2019/html/He\_Sensitive-Sample\_Fingerprinting\_of\_Deep\_Neural\_Networks\_CVPR\_2019\_paper.html}, doi = {10.1109/CVPR.2019.00486}, timestamp = {Mon, 30 Aug 2021 17:01:14 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/HeZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HeRHCL19, author = {Zecheng He and Aswin Raghavan and Guangyuan Hu and Sek M. Chai and Ruby B. Lee}, title = {Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {160--167}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00030}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00030}, timestamp = {Thu, 14 Nov 2019 10:35:10 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HeRHCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/SchaumontLPB18, author = {Patrick Schaumont and Ruby B. Lee and Ronald Perez and Guido Bertoni}, title = {Special Section on Secure Computer Architectures}, journal = {{IEEE} Trans. Computers}, volume = {67}, number = {3}, pages = {305--306}, year = {2018}, url = {https://doi.org/10.1109/TC.2017.2788658}, doi = {10.1109/TC.2017.2788658}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/SchaumontLPB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/ZhangL18, author = {Tianwei Zhang and Ruby B. Lee}, title = {Design, Implementation and Verification of Cloud Architecture for Monitoring a Virtual Machine's Security Health}, journal = {{IEEE} Trans. Computers}, volume = {67}, number = {6}, pages = {799--815}, year = {2018}, url = {https://doi.org/10.1109/TC.2017.2780823}, doi = {10.1109/TC.2017.2780823}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/ZhangL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangZL18, author = {Tianwei Zhang and Yinqian Zhang and Ruby B. Lee}, title = {Analyzing Cache Side Channels Using Deep Neural Networks}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {174--186}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274715}, doi = {10.1145/3274694.3274715}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ZhangZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenLMZLCW18, author = {Sanchuan Chen and Fangfei Liu and Zeyu Mi and Yinqian Zhang and Ruby B. Lee and Haibo Chen and XiaoFeng Wang}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {601--608}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196501}, doi = {10.1145/3196494.3196501}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenLMZLCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpca/ShalabiYHLT18, author = {Yasser Shalabi and Mengjia Yan and Nima Honarmand and Ruby B. Lee and Josep Torrellas}, title = {Record-Replay Architecture as a General Security Framework}, booktitle = {{IEEE} International Symposium on High Performance Computer Architecture, {HPCA} 2018, Vienna, Austria, February 24-28, 2018}, pages = {180--193}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/HPCA.2018.00025}, doi = {10.1109/HPCA.2018.00025}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpca/ShalabiYHLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeOKL18, author = {Wei{-}Han Lee and Jorge Ortiz and Bongjun Ko and Ruby B. Lee}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {139--148}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006650301390148}, doi = {10.5220/0006650301390148}, timestamp = {Fri, 07 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeeOKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2018hasp, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292}, doi = {10.1145/3214292}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/2018hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-05394, author = {Wei{-}Han Lee and Jorge Ortiz and Bongjun Ko and Ruby B. Lee}, title = {Time Series Segmentation through Automatic Feature Learning}, journal = {CoRR}, volume = {abs/1801.05394}, year = {2018}, url = {http://arxiv.org/abs/1801.05394}, eprinttype = {arXiv}, eprint = {1801.05394}, timestamp = {Fri, 07 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-05394.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-05534, author = {Wei{-}Han Lee and Changchang Liu and Shouling Ji and Prateek Mittal and Ruby B. Lee}, title = {Blind De-anonymization Attacks using Social Networks}, journal = {CoRR}, volume = {abs/1801.05534}, year = {2018}, url = {http://arxiv.org/abs/1801.05534}, eprinttype = {arXiv}, eprint = {1801.05534}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-05534.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-06496, author = {Zecheng He and Aswin Raghavan and Sek M. Chai and Ruby B. Lee}, title = {Detecting Zero-day Controller Hijacking Attacks on the Power-Grid with Enhanced Deep Learning}, journal = {CoRR}, volume = {abs/1806.06496}, year = {2018}, url = {http://arxiv.org/abs/1806.06496}, eprinttype = {arXiv}, eprint = {1806.06496}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-06496.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-01854, author = {Jakub Szefer and Tianwei Zhang and Ruby B. Lee}, title = {Practical and Scalable Security Verification of Secure Architectures}, journal = {CoRR}, volume = {abs/1807.01854}, year = {2018}, url = {http://arxiv.org/abs/1807.01854}, eprinttype = {arXiv}, eprint = {1807.01854}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-01854.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-01860, author = {Tianwei Zhang and Zecheng He and Ruby B. Lee}, title = {Privacy-preserving Machine Learning through Data Obfuscation}, journal = {CoRR}, volume = {abs/1807.01860}, year = {2018}, url = {http://arxiv.org/abs/1807.01860}, eprinttype = {arXiv}, eprint = {1807.01860}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-01860.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-03277, author = {Zecheng He and Tianwei Zhang and Ruby B. Lee}, title = {VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting}, journal = {CoRR}, volume = {abs/1808.03277}, year = {2018}, url = {http://arxiv.org/abs/1808.03277}, eprinttype = {arXiv}, eprint = {1808.03277}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-03277.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cal/WuLL17, author = {Hao Wu and Fangfei Liu and Ruby B. Lee}, title = {Cloud Server Benchmark Suite for Evaluating New Hardware Architectures}, journal = {{IEEE} Comput. Archit. Lett.}, volume = {16}, number = {1}, pages = {14--17}, year = {2017}, url = {https://doi.org/10.1109/LCA.2016.2597818}, doi = {10.1109/LCA.2016.2597818}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cal/WuLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangZL17, author = {Tianwei Zhang and Yinqian Zhang and Ruby B. Lee}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {DoS Attacks on Your Memory in Cloud}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {253--265}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3052978}, doi = {10.1145/3052973.3052978}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/HeZL17, author = {Zecheng He and Tianwei Zhang and Ruby B. Lee}, title = {Machine Learning Based DDoS Attack Detection from Source Side in Cloud}, booktitle = {4th {IEEE} International Conference on Cyber Security and Cloud Computing, CSCloud 2017, New York, NY, USA, June 26-28, 2017}, pages = {114--120}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSCloud.2017.58}, doi = {10.1109/CSCLOUD.2017.58}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscloud/HeZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LeeL17, author = {Wei{-}Han Lee and Ruby B. Lee}, title = {Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning}, booktitle = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017}, pages = {297--308}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSN.2017.24}, doi = {10.1109/DSN.2017.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LeeL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LeeL17a, author = {Wei{-}Han Lee and Ruby B. Lee}, title = {Sensor-Based Implicit Authentication of Smartphone Users}, booktitle = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017}, pages = {309--320}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSN.2017.21}, doi = {10.1109/DSN.2017.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LeeL17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/ZhangXBL17, author = {Tianwei Zhang and Yuan Xu and Yungang Bao and Ruby B. Lee}, title = {CloudShelter: Protecting Virtual Machines' Memory Resource Availability in Clouds}, booktitle = {2017 {IEEE} International Conference on Computer Design, {ICCD} 2017, Boston, MA, USA, November 5-8, 2017}, pages = {557--564}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICCD.2017.97}, doi = {10.1109/ICCD.2017.97}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccd/ZhangXBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeLJML17a, author = {Wei{-}Han Lee and Changchang Liu and Shouling Ji and Prateek Mittal and Ruby B. Lee}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {How to Quantify Graph De-anonymization Risks}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {84--104}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_5}, doi = {10.1007/978-3-319-93354-2\_5}, timestamp = {Fri, 24 Aug 2018 07:46:20 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeeLJML17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeLJML17, author = {Wei{-}Han Lee and Changchang Liu and Shouling Ji and Prateek Mittal and Ruby B. Lee}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Quantification of De-anonymization Risks in Social Networks}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {126--135}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006192501260135}, doi = {10.5220/0006192501260135}, timestamp = {Thu, 18 May 2017 14:22:34 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeeLJML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ZhangL17, author = {Tianwei Zhang and Ruby B. Lee}, title = {Host-Based Dos Attacks and Defense in the Cloud}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {3:1--3:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092630}, doi = {10.1145/3092627.3092630}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/ZhangL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/HeL17, author = {Zecheng He and Ruby B. Lee}, editor = {Hillery C. Hunter and Jaime Moreno and Joel S. Emer and Daniel S{\'{a}}nchez}, title = {How secure is your cache against side-channel attacks?}, booktitle = {Proceedings of the 50th Annual {IEEE/ACM} International Symposium on Microarchitecture, {MICRO} 2017, Cambridge, MA, USA, October 14-18, 2017}, pages = {341--353}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3123939.3124546}, doi = {10.1145/3123939.3124546}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/HeL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/LeeLSJL17, author = {Wei{-}Han Lee and Xiaochen Liu and Yilin Shen and Hongxia Jin and Ruby B. Lee}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Secure Pick Up: Implicit Authentication When You Start Using the Smartphone}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {67--78}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078870}, doi = {10.1145/3078861.3078870}, timestamp = {Tue, 09 Feb 2021 08:50:30 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/LeeLSJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/LeeLJML17, author = {Wei{-}Han Lee and Changchang Liu and Shouling Ji and Prateek Mittal and Ruby B. Lee}, editor = {Bhavani Thuraisingham and Adam J. Lee}, title = {Blind De-anonymization Attacks using Social Networks}, booktitle = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30 - November 3, 2017}, pages = {1--4}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139550.3139562}, doi = {10.1145/3139550.3139562}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/wpes/LeeLJML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LeeL17a, author = {Wei{-}Han Lee and Ruby B. Lee}, title = {Multi-sensor authentication to improve smartphone security}, journal = {CoRR}, volume = {abs/1703.03378}, year = {2017}, url = {http://arxiv.org/abs/1703.03378}, eprinttype = {arXiv}, eprint = {1703.03378}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LeeL17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LeeL17b, author = {Wei{-}Han Lee and Ruby B. Lee}, title = {Implicit Sensor-based Authentication of Smartphone Users with Smartwatch}, journal = {CoRR}, volume = {abs/1703.03523}, year = {2017}, url = {http://arxiv.org/abs/1703.03523}, eprinttype = {arXiv}, eprint = {1703.03523}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LeeL17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LeeLJML17, author = {Wei{-}Han Lee and Changchang Liu and Shouling Ji and Prateek Mittal and Ruby B. Lee}, title = {Quantification of De-anonymization Risks in Social Networks}, journal = {CoRR}, volume = {abs/1703.04873}, year = {2017}, url = {http://arxiv.org/abs/1703.04873}, eprinttype = {arXiv}, eprint = {1703.04873}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LeeLJML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-09366, author = {Wei{-}Han Lee and Xiaochen Liu and Yilin Shen and Hongxia Jin and Ruby B. Lee}, title = {Secure Pick Up: Implicit Authentication When You Start Using the Smartphone}, journal = {CoRR}, volume = {abs/1708.09366}, year = {2017}, url = {http://arxiv.org/abs/1708.09366}, eprinttype = {arXiv}, eprint = {1708.09366}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-09366.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-09754, author = {Wei{-}Han Lee and Ruby B. Lee}, title = {Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning}, journal = {CoRR}, volume = {abs/1708.09754}, year = {2017}, url = {http://arxiv.org/abs/1708.09754}, eprinttype = {arXiv}, eprint = {1708.09754}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-09754.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/micro/LiuWML16, author = {Fangfei Liu and Hao Wu and Kenneth Mai and Ruby B. Lee}, title = {Newcache: Secure Cache Architecture Thwarting Cache Side-Channel Attacks}, journal = {{IEEE} Micro}, volume = {36}, number = {5}, pages = {8--16}, year = {2016}, url = {https://doi.org/10.1109/MM.2016.85}, doi = {10.1109/MM.2016.85}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/micro/LiuWML16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/micro/ZhangL16, author = {Tianwei Zhang and Ruby B. Lee}, title = {Monitoring and Attestation of Virtual Machine Security Health in Cloud Computing}, journal = {{IEEE} Micro}, volume = {36}, number = {5}, pages = {28--37}, year = {2016}, url = {https://doi.org/10.1109/MM.2016.86}, doi = {10.1109/MM.2016.86}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/micro/ZhangL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/MontuschiMCCRDE16, author = {Paolo Montuschi and Edward J. McCluskey and Samarjit Chakraborty and Jason Cong and Ram{\'{o}}n M. Rodr{\'{\i}}guez{-}Dagnino and Fred Douglis and Lieven Eeckhout and Gernot Heiser and Sushil Jajodia and Ruby B. Lee and Dinesh Manocha and Tom{\'{a}}s F. Pena and Isabelle Puaut and Hanan Samet and Donatella Sciuto}, title = {State of the Journal}, journal = {{IEEE} Trans. Computers}, volume = {65}, number = {7}, pages = {2014--2018}, year = {2016}, url = {https://doi.org/10.1109/TC.2016.2568358}, doi = {10.1109/TC.2016.2568358}, timestamp = {Thu, 27 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/MontuschiMCCRDE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpca/LiuGYMRHL16, author = {Fangfei Liu and Qian Ge and Yuval Yarom and Frank McKeen and Carlos V. Rozas and Gernot Heiser and Ruby B. Lee}, title = {CATalyst: Defeating last-level cache side channel attacks in cloud computing}, booktitle = {2016 {IEEE} International Symposium on High Performance Computer Architecture, {HPCA} 2016, Barcelona, Spain, March 12-16, 2016}, pages = {406--418}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HPCA.2016.7446082}, doi = {10.1109/HPCA.2016.7446082}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpca/LiuGYMRHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccad/ShinZLHCLP16, author = {Jangseop Shin and Hongce Zhang and Jinyong Lee and Ingoo Heo and Yu{-}Yuan Chen and Ruby B. Lee and Yunheung Paek}, editor = {Frank Liu}, title = {A hardware-based technique for efficient implicit information flow tracking}, booktitle = {Proceedings of the 35th International Conference on Computer-Aided Design, {ICCAD} 2016, Austin, TX, USA, November 7-10, 2016}, pages = {94}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2966986.2966991}, doi = {10.1145/2966986.2966991}, timestamp = {Fri, 23 Jun 2023 22:29:48 +0200}, biburl = {https://dblp.org/rec/conf/iccad/ShinZLHCLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/LeeL16, author = {Wei{-}Han Lee and Ruby B. Lee}, title = {Implicit Sensor-based Authentication of Smartphone Users with Smartwatch}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {9:1--9:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948627}, doi = {10.1145/2948618.2948627}, timestamp = {Tue, 06 Nov 2018 11:07:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/LeeL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangZL16, author = {Tianwei Zhang and Yinqian Zhang and Ruby B. Lee}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {CloudRadar: {A} Real-Time Side-Channel Attack Detection System in Clouds}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {118--140}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_6}, doi = {10.1007/978-3-319-45719-2\_6}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZhangZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuLL16, author = {Hao Wu and Fangfei Liu and Ruby B. Lee}, title = {Cloud Server Benchmarks for Performance Evaluation of New Hardware Architecture}, journal = {CoRR}, volume = {abs/1603.01352}, year = {2016}, url = {http://arxiv.org/abs/1603.01352}, eprinttype = {arXiv}, eprint = {1603.01352}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhangZL16, author = {Tianwei Zhang and Yinqian Zhang and Ruby B. Lee}, title = {Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation}, journal = {CoRR}, volume = {abs/1603.03404}, year = {2016}, url = {http://arxiv.org/abs/1603.03404}, eprinttype = {arXiv}, eprint = {1603.03404}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhangZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Lee15, author = {Ruby B. Lee}, title = {Rethinking Computers for Cybersecurity}, journal = {Computer}, volume = {48}, number = {4}, pages = {16--25}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.118}, doi = {10.1109/MC.2015.118}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Lee15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asscc/ErbagciLCALM15, author = {Burak Erbagci and Fangfei Liu and Cagla Cakir and Nail Etkin Can Akkaya and Ruby B. Lee and Ken Mai}, title = {A 32kB secure cache memory with dynamic replacement mapping in 65nm bulk {CMOS}}, booktitle = {{IEEE} Asian Solid-State Circuits Conference, {A-SSCC} 2015, Xia'men, China, November 9-11, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ASSCC.2015.7387501}, doi = {10.1109/ASSCC.2015.7387501}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/asscc/ErbagciLCALM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeL15a, author = {Wei{-}Han Lee and Ruby B. Lee}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Implicit Authentication for Smartphone Security}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {160--176}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_10}, doi = {10.1007/978-3-319-27668-7\_10}, timestamp = {Thu, 16 May 2019 16:43:34 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeeL15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeL15, author = {Wei{-}Han Lee and Ruby B. Lee}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Multi-sensor Authentication to Improve Smartphone Security}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {270--280}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005239802700280}, doi = {10.5220/0005239802700280}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeeL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/LiuWL15, author = {Fangfei Liu and Hao Wu and Ruby B. Lee}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Can randomized mapping secure instruction caches from side-channel attacks?}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768570}, doi = {10.1145/2768566.2768570}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/LiuWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ZhangL15, author = {Tianwei Zhang and Ruby B. Lee}, editor = {Deborah T. Marr and David H. Albonesi}, title = {CloudMonatt: an architecture for security health monitoring and attestation of virtual machines in cloud computing}, booktitle = {Proceedings of the 42nd Annual International Symposium on Computer Architecture, Portland, OR, USA, June 13-17, 2015}, pages = {362--374}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2749469.2750422}, doi = {10.1145/2749469.2750422}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/ZhangL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiuYGHL15, author = {Fangfei Liu and Yuval Yarom and Qian Ge and Gernot Heiser and Ruby B. Lee}, title = {Last-Level Cache Side-Channel Attacks are Practical}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {605--622}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.43}, doi = {10.1109/SP.2015.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LiuYGHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/systor/FuchsL15, author = {Adi Fuchs and Ruby B. Lee}, editor = {Dalit Naor and Gernot Heiser and Idit Keidar}, title = {Disruptive prefetching: impact on side-channel attacks and cache designs}, booktitle = {Proceedings of the 8th {ACM} International Systems and Storage Conference, {SYSTOR} 2015, Haifa, Israel, May 26-28, 2015}, pages = {14:1--14:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2757667.2757672}, doi = {10.1145/2757667.2757672}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/systor/FuchsL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2015hasp, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566}, doi = {10.1145/2768566}, isbn = {978-1-4503-3483-9}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/2015hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaromGLLH15, author = {Yuval Yarom and Qian Ge and Fangfei Liu and Ruby B. Lee and Gernot Heiser}, title = {Mapping the Intel Last-Level Cache}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {905}, year = {2015}, url = {http://eprint.iacr.org/2015/905}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaromGLLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangL14, author = {Tianwei Zhang and Ruby B. Lee}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {New models of cache architectures characterizing information leakage from cache side channels}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {96--105}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664273}, doi = {10.1145/2664243.2664273}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ZhangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SzeferJPL14, author = {Jakub Szefer and Pramod A. Jamkhedkar and Diego Perez{-}Botero and Ruby B. Lee}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {Cyber defenses for physical attacks and insider threats in cloud computing}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {519--524}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590310}, doi = {10.1145/2590296.2590310}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SzeferJPL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotchips/Lee14, author = {Ruby B. Lee}, title = {University research in hardware security}, booktitle = {2014 {IEEE} Hot Chips 26 Symposium (HCS), Cupertino, CA, USA, August 10-12, 2014}, pages = {1--27}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/HOTCHIPS.2014.7478799}, doi = {10.1109/HOTCHIPS.2014.7478799}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/hotchips/Lee14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotchips/Lee14a, author = {Ruby B. Lee}, title = {Security basics}, booktitle = {2014 {IEEE} Hot Chips 26 Symposium (HCS), Cupertino, CA, USA, August 10-12, 2014}, pages = {1--32}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/HOTCHIPS.2014.7478795}, doi = {10.1109/HOTCHIPS.2014.7478795}, timestamp = {Sun, 19 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotchips/Lee14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotchips/LeeCDD14, author = {Ruby B. Lee and Vikas Chandra and Leendert van Doorn and David Durham}, title = {HotChips security tutorial}, booktitle = {2014 {IEEE} Hot Chips 26 Symposium (HCS), Cupertino, CA, USA, August 10-12, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/HOTCHIPS.2014.7478794}, doi = {10.1109/HOTCHIPS.2014.7478794}, timestamp = {Sun, 19 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotchips/LeeCDD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/LiuL14, author = {Fangfei Liu and Ruby B. Lee}, title = {Random Fill Cache Architecture}, booktitle = {47th Annual {IEEE/ACM} International Symposium on Microarchitecture, {MICRO} 2014, Cambridge, United Kingdom, December 13-17, 2014}, pages = {203--215}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MICRO.2014.28}, doi = {10.1109/MICRO.2014.28}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/LiuL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/securecloud14/SzeferL14, author = {Jakub Szefer and Ruby B. Lee}, editor = {Sushil Jajodia and Krishna Kant and Pierangela Samarati and Anoop Singhal and Vipin Swarup and Cliff Wang}, title = {Hardware-Enhanced Security for Cloud Computing}, booktitle = {Secure Cloud Computing}, pages = {57--76}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-9278-8\_3}, doi = {10.1007/978-1-4614-9278-8\_3}, timestamp = {Thu, 13 Feb 2020 15:16:45 +0100}, biburl = {https://dblp.org/rec/books/sp/securecloud14/SzeferL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2014hasp, editor = {Ruby B. Lee and Weidong Shi}, title = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765}, doi = {10.1145/2611765}, isbn = {978-1-4503-2777-0}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/2014hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/synthesis/2013Lee, author = {Ruby B. Lee}, title = {Security Basics for Computer Architects}, series = {Synthesis Lectures on Computer Architecture}, publisher = {Morgan {\&} Claypool Publishers}, year = {2013}, url = {https://doi.org/10.2200/S00512ED1V01Y201305CAC025}, doi = {10.2200/S00512ED1V01Y201305CAC025}, isbn = {9781627051552}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/synthesis/2013Lee.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/SzeferL13, author = {Jakub Szefer and Ruby B. Lee}, title = {BitDeposit: Deterring Attacks and Abuses of Cloud Computing Services through Economic Measures}, booktitle = {13th {IEEE/ACM} International Symposium on Cluster, Cloud, and Grid Computing, CCGrid 2013, Delft, Netherlands, May 13-16, 2013}, pages = {630--635}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CCGrid.2013.102}, doi = {10.1109/CCGRID.2013.102}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/SzeferL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Perez-BoteroSL13, author = {Diego Perez{-}Botero and Jakub Szefer and Ruby B. Lee}, editor = {Xingming Sun and Elaine Shi and Kui Ren}, title = {Characterizing hypervisor vulnerabilities in cloud computing servers}, booktitle = {Proceedings of the 2013 International Workshop on Security in Cloud Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013}, pages = {3--10}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484402.2484406}, doi = {10.1145/2484402.2484406}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Perez-BoteroSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/JamkhedkarSPZTL13, author = {Pramod A. Jamkhedkar and Jakub Szefer and Diego Perez{-}Botero and Tianwei Zhang and Gina Triolo and Ruby B. Lee}, title = {A Framework for Realizing Security on Demand in Cloud Computing}, booktitle = {{IEEE} 5th International Conference on Cloud Computing Technology and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5, 2013, Volume 1}, pages = {371--378}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CloudCom.2013.55}, doi = {10.1109/CLOUDCOM.2013.55}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/JamkhedkarSPZTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ZhangLCL13, author = {Tianwei Zhang and Fangfei Liu and Si Chen and Ruby B. Lee}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side channel vulnerability metrics: the promise and the pitfalls}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487728}, doi = {10.1145/2487726.2487728}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/ZhangLCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/LiuL13, author = {Fangfei Liu and Ruby B. Lee}, editor = {Ruby B. Lee and Weidong Shi}, title = {Security testing of a secure cache design}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {3}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487729}, doi = {10.1145/2487726.2487729}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/LiuL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2013hasp, editor = {Ruby B. Lee and Weidong Shi}, title = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726}, doi = {10.1145/2487726}, isbn = {978-1-4503-2118-1}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/2013hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acssc/CardarilliNFRL12, author = {Gian Carlo Cardarilli and Luca Di Nunzio and Rocco Fazzolari and Marco Re and Ruby B. Lee}, editor = {Michael B. Matthews}, title = {Integration of butterfly and inverse butterfly nets in embedded processors: Effects on power saving}, booktitle = {Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers, {ACSCC} 2012, Pacific Grove, CA, USA, November 4-7, 2012}, pages = {1457--1459}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ACSSC.2012.6489268}, doi = {10.1109/ACSSC.2012.6489268}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/acssc/CardarilliNFRL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/SzeferL12, author = {Jakub Szefer and Ruby B. Lee}, editor = {Tim Harris and Michael L. Scott}, title = {Architectural support for hypervisor-secure virtualization}, booktitle = {Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, {ASPLOS} 2012, London, UK, March 3-7, 2012}, pages = {437--450}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2150976.2151022}, doi = {10.1145/2150976.2151022}, timestamp = {Wed, 07 Jul 2021 13:23:08 +0200}, biburl = {https://dblp.org/rec/conf/asplos/SzeferL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenJL12, author = {Yu{-}Yuan Chen and Pramod A. Jamkhedkar and Ruby B. Lee}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {A software-hardware architecture for self-protecting data}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {14--27}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382201}, doi = {10.1145/2382196.2382201}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChenJL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeeSS12, author = {Ruby B. Lee and Simha Sethumadhavan and G. Edward Suh}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Hardware enhanced security}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1052}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382323}, doi = {10.1145/2382196.2382323}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeeSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/SzeferJCL12, author = {Jakub Szefer and Pramod A. Jamkhedkar and Yu{-}Yuan Chen and Ruby B. Lee}, title = {Physical attack protection with human-secure virtualization in data centers}, booktitle = {{IEEE/IFIP} International Conference on Dependable Systems and Networks Workshops, {DSN} 2012, Boston, MA, USA, June 25-28, 2012}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/DSNW.2012.6264664}, doi = {10.1109/DSNW.2012.6264664}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/SzeferJCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/VishikLC12, author = {Claire Vishik and Ruby B. Lee and Fred Chong}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Building Technologies that Help Cyber-Defense: Hardware-enabled Trust}, booktitle = {{ISSE} 2012 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2012 Conference, Brussels, Belgium, October 23-24, 2012}, pages = {316--325}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-658-00333-3\_30}, doi = {10.1007/978-3-658-00333-3\_30}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/VishikLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/ZhangSL12, author = {Tianwei Zhang and Jakub Szefer and Ruby B. Lee}, title = {Security verification of hardware-enabled attestation protocols}, booktitle = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture, {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December 1-5, 2012}, pages = {47--54}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MICROW.2012.16}, doi = {10.1109/MICROW.2012.16}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/ZhangSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Lee12, author = {Ruby B. Lee}, editor = {Vijay Atluri and Jaideep Vaidya and Axel Kern and Murat Kantarcioglu}, title = {Hardware-enhanced access control for cloud computing}, booktitle = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '12, Newark, NJ, {USA} - June 20 - 22, 2012}, pages = {1--2}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2295136.2295138}, doi = {10.1145/2295136.2295138}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Lee12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/LanLCL11, author = {Tian Lan and Xiaojun Lin and Mung Chiang and Ruby B. Lee}, title = {Stability and benefits of suboptimal utility maximization}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {19}, number = {4}, pages = {1194--1207}, year = {2011}, url = {https://doi.org/10.1109/TNET.2011.2144617}, doi = {10.1109/TNET.2011.2144617}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/LanLCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SzeferKLR11, author = {Jakub Szefer and Eric Keller and Ruby B. Lee and Jennifer Rexford}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Eliminating the hypervisor attack surface for a more secure cloud}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {401--412}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046754}, doi = {10.1145/2046707.2046754}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SzeferKLR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/SzeferL11, author = {Jakub Szefer and Ruby B. Lee}, title = {A Case for Hardware Protection of Guest VMs from Compromised Hypervisors in Cloud Computing}, booktitle = {31st {IEEE} International Conference on Distributed Computing Systems Workshops {(ICDCS} 2011 Workshops), 20-24 June 2011, Minneapolis, Minnesota, {USA}}, pages = {248--252}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICDCSW.2011.51}, doi = {10.1109/ICDCSW.2011.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/SzeferL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rsp/SzeferZCCCLCL11, author = {Jakub Szefer and Wei Zhang and Yu{-}Yuan Chen and David Champagne and King Chan and Will X. Y. Li and Ray C. C. Cheung and Ruby B. Lee}, title = {Rapid single-chip secure processor prototyping on the OpenSPARC {FPGA} platform}, booktitle = {Proceedings of the 22nd {IEEE} International Symposium on Rapid System Prototyping, {RSP} 2011, Karlsruhe, Germany, 24-27 May, 2011}, pages = {38--44}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/RSP.2011.5929973}, doi = {10.1109/RSP.2011.5929973}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/rsp/SzeferZCCCLCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/eatcs/XuDHLLC11, author = {Dahai Xu and Jeffrey S. Dwoskin and Jianwei Huang and Tian Lan and Ruby B. Lee and Mung Chiang}, editor = {Sotiris E. Nikoletseas and Jos{\'{e}} D. P. Rolim}, title = {Key Management in Sensor Networks}, booktitle = {Theoretical Aspects of Distributed Computing in Sensor Networks}, series = {Monographs in Theoretical Computer Science. An {EATCS} Series}, pages = {741--785}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-14849-1\_23}, doi = {10.1007/978-3-642-14849-1\_23}, timestamp = {Mon, 19 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/eatcs/XuDHLLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DwoskinGCL10, author = {Jeffrey S. Dwoskin and Mahadevan Gomathisankaran and Yu{-}Yuan Chen and Ruby B. Lee}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {A framework for testing hardware-software security architectures}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {387--397}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920318}, doi = {10.1145/1920261.1920318}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DwoskinGCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/SzeferCL10, author = {Jakub Szefer and Yu{-}Yuan Chen and Ruby B. Lee}, editor = {Fran{\c{c}}ois Charot and Frank Hannig and J{\"{u}}rgen Teich and Christophe Wolinski}, title = {General-purpose {FPGA} platform for efficient encryption and hashing}, booktitle = {21st {IEEE} International Conference on Application-specific Systems Architectures and Processors, {ASAP} 2010, Rennes, France, 7-9 July 2010}, pages = {309--312}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ASAP.2010.5540976}, doi = {10.1109/ASAP.2010.5540976}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/SzeferCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpca/ChampagneL10, author = {David Champagne and Ruby B. Lee}, editor = {Matthew T. Jacob and Chita R. Das and Pradip Bose}, title = {Scalable architectural support for trusted software}, booktitle = {16th International Conference on High-Performance Computer Architecture {(HPCA-16} 2010), 9-14 January 2010, Bangalore, India}, pages = {1--12}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HPCA.2010.5416657}, doi = {10.1109/HPCA.2010.5416657}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpca/ChampagneL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/KellerSRL10, author = {Eric Keller and Jakub Szefer and Jennifer Rexford and Ruby B. Lee}, editor = {Andr{\'{e}} Seznec and Uri C. Weiser and Ronny Ronen}, title = {NoHype: virtualized cloud infrastructure without the virtualization}, booktitle = {37th International Symposium on Computer Architecture {(ISCA} 2010), June 19-23, 2010, Saint-Malo, France}, pages = {350--361}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1815961.1816010}, doi = {10.1145/1815961.1816010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/KellerSRL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sasp/LeeC10, author = {Ruby B. Lee and Yu{-}Yuan Chen}, title = {Processor accelerator for {AES}}, booktitle = {{IEEE} 8th Symposium on Application Specific Processors, {SASP} 2010, Anaheim, CA, USA, June 13-14, 2010}, pages = {16--21}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SASP.2010.5521153}, doi = {10.1109/SASP.2010.5521153}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasp/LeeC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/HilewitzL09, author = {Yedidya Hilewitz and Ruby B. Lee}, title = {A New Basis for Shifters in General-Purpose Processors for Existing and Advanced Bit Manipulations}, journal = {{IEEE} Trans. Computers}, volume = {58}, number = {8}, pages = {1035--1048}, year = {2009}, url = {https://doi.org/10.1109/TC.2008.219}, doi = {10.1109/TC.2008.219}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/HilewitzL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/ElbazCGLPT09, author = {Reouven Elbaz and David Champagne and Catherine H. Gebotys and Ruby B. Lee and Nachiketh R. Potlapally and Lionel Torres}, title = {Hardware Mechanisms for Memory Authentication: {A} Survey of Existing Techniques and Engines}, journal = {Trans. Comput. Sci.}, volume = {4}, pages = {1--22}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01004-0\_1}, doi = {10.1007/978-3-642-01004-0\_1}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcos/ElbazCGLPT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/GomathisankaranL09, author = {Mahadevan Gomathisankaran and Ruby B. Lee}, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {Tantra: {A} Fast {PRNG} Algorithm and its Implementation}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {593--598}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Tue, 04 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/GomathisankaranL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LanLC09, author = {Tian Lan and Ruby B. Lee and Mung Chiang}, title = {Multi-Path Key Establishment against {REM} Attacks in Wireless Ad Hoc Networks}, booktitle = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM} 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GLOCOM.2009.5426213}, doi = {10.1109/GLOCOM.2009.5426213}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/LanLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ChenL09, author = {Yu{-}Yuan Chen and Ruby B. Lee}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {Hardware-Assisted Application-Level Access Control}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {363--378}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_29}, doi = {10.1007/978-3-642-04474-8\_29}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/isw/ChenL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/KellerLR09, author = {Eric Keller and Ruby B. Lee and Jennifer Rexford}, editor = {Guru M. Parulkar and C{\'{e}}dric Westphal}, title = {Accountability in hosted virtual networks}, booktitle = {Proceedings of the 1st {ACM} {SIGCOMM} Workshop on Virtualized Infrastructure Systems and Architectures, {VISA} 2009, Barcelona, Spain, August 17, 2009}, pages = {29--36}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1592648.1592654}, doi = {10.1145/1592648.1592654}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/KellerLR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socc/HoLSL09, author = {Chun Hok Ho and Wayne Luk and Jakub Szefer and Ruby B. Lee}, title = {Tuning instruction customisation for reconfigurable system-on-chip}, booktitle = {Annual {IEEE} International SoC Conference, SoCC 2009, September 9-11, 2009, Belfast, Northern Ireland, UK, Proceedings}, pages = {61--64}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/SOCCON.2009.5398096}, doi = {10.1109/SOCCON.2009.5398096}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/socc/HoLSL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LevinDBNCLIB09, author = {Timothy E. Levin and Jeffrey S. Dwoskin and Ganesha Bhaskara and Thuy D. Nguyen and Paul C. Clark and Ruby B. Lee and Cynthia E. Irvine and Terry Benzel}, editor = {Liqun Chen and Chris J. Mitchell and Andrew P. Martin}, title = {Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture}, booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5471}, pages = {133--152}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00587-9\_9}, doi = {10.1007/978-3-642-00587-9\_9}, timestamp = {Sat, 28 Aug 2021 16:06:55 +0200}, biburl = {https://dblp.org/rec/conf/trust/LevinDBNCLIB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/ShiYL08, author = {Zhijie Jerry Shi and Xiao Yang and Ruby B. Lee}, title = {Alternative application-specific processor architectures for fast arbitrary bit permutations}, journal = {Int. J. Embed. Syst.}, volume = {3}, number = {4}, pages = {219--228}, year = {2008}, url = {https://doi.org/10.1504/IJES.2008.022393}, doi = {10.1504/IJES.2008.022393}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/ShiYL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/HilewitzL08, author = {Yedidya Hilewitz and Ruby B. Lee}, title = {Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors}, journal = {J. Signal Process. Syst.}, volume = {53}, number = {1-2}, pages = {145--169}, year = {2008}, url = {https://doi.org/10.1007/s11265-008-0212-8}, doi = {10.1007/S11265-008-0212-8}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vlsisp/HilewitzL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/HilewitzLL08, author = {Yedidya Hilewitz and C{\'{e}}dric Lauradoux and Ruby B. Lee}, title = {Bit matrix multiplication in commodity processors}, booktitle = {19th {IEEE} International Conference on Application-Specific Systems, Architectures and Processors, {ASAP} 2008, July 2-4, 2008, Leuven, Belgium}, pages = {7--12}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ASAP.2008.4580146}, doi = {10.1109/ASAP.2008.4580146}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/HilewitzLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HilewitzYL08, author = {Yedidya Hilewitz and Yiqun Lisa Yin and Ruby B. Lee}, editor = {Kaisa Nyberg}, title = {Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {173--188}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_11}, doi = {10.1007/978-3-540-71039-4\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/HilewitzYL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LanLCL08, author = {Tian Lan and Xiaojun Lin and Mung Chiang and Ruby B. Lee}, title = {How Bad is Suboptimal Rate Allocation?}, booktitle = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, {USA}}, pages = {321--325}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/INFOCOM.2008.73}, doi = {10.1109/INFOCOM.2008.73}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LanLCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ChampagneEL08, author = {David Champagne and Reouven Elbaz and Ruby B. Lee}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {The Reduced Address Space {(RAS)} for Application Memory Authentication}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {47--63}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_4}, doi = {10.1007/978-3-540-85886-7\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/ChampagneEL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/WangL08, author = {Zhenghong Wang and Ruby B. Lee}, title = {A novel cache architecture with enhanced performance and security}, booktitle = {41st Annual {IEEE/ACM} International Symposium on Microarchitecture {(MICRO-41} 2008), November 8-12, 2008, Lake Como, Italy}, pages = {83--93}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MICRO.2008.4771781}, doi = {10.1109/MICRO.2008.4771781}, timestamp = {Tue, 31 May 2022 14:39:58 +0200}, biburl = {https://dblp.org/rec/conf/micro/WangL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/ChampagneEGTL08, author = {David Champagne and Reouven Elbaz and Catherine H. Gebotys and Lionel Torres and Ruby B. Lee}, title = {Forward-Secure Content Distribution to Reconfigurable Hardware}, booktitle = {ReConFig'08: 2008 International Conference on Reconfigurable Computing and FPGAs, 3-5 December 2008, Cancun, Mexico, Proceedings}, pages = {450--455}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ReConFig.2008.51}, doi = {10.1109/RECONFIG.2008.51}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/ChampagneEGTL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/PotlapallyRRJL07, author = {Nachiketh R. Potlapally and Anand Raghunathan and Srivaths Ravi and Niraj K. Jha and Ruby B. Lee}, title = {Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based Analysis}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {15}, number = {4}, pages = {465--470}, year = {2007}, url = {https://doi.org/10.1109/TVLSI.2007.893665}, doi = {10.1109/TVLSI.2007.893665}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvlsi/PotlapallyRRJL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/PotlapallyRRLJ07, author = {Nachiketh R. Potlapally and Srivaths Ravi and Anand Raghunathan and Ruby B. Lee and Niraj K. Jha}, title = {Configuration and Extension of Embedded Processors to Optimize IPSec Protocol Execution}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {15}, number = {5}, pages = {605--609}, year = {2007}, url = {https://doi.org/10.1109/TVLSI.2007.896912}, doi = {10.1109/TVLSI.2007.896912}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvlsi/PotlapallyRRLJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/HilewitzL07, author = {Yedidya Hilewitz and Ruby B. Lee}, title = {Performing Advanced Bit Manipulations Efficiently in General-Purpose Processors}, booktitle = {18th {IEEE} Symposium on Computer Arithmetic {(ARITH-18} 2007), 25-27 June 2007, Montpellier, France}, pages = {251--260}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARITH.2007.27}, doi = {10.1109/ARITH.2007.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arith/HilewitzL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/JosephsonLL07, author = {William Josephson and Ruby B. Lee and Kai Li}, title = {{ISA} Support for Fingerprinting and Erasure Codes}, booktitle = {{IEEE} International Conference on Application-Specific Systems, Architectures and Processors, {ASAP} 2007, Montr{\'{e}}al, Qu{\'{e}}bec, Canada, July 8-11, 2007}, pages = {415--422}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ASAP.2007.4459299}, doi = {10.1109/ASAP.2007.4459299}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/JosephsonLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DwoskinL07, author = {Jeffrey S. Dwoskin and Ruby B. Lee}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Hardware-rooted trust for secure key management and transient trust}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {389--400}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315294}, doi = {10.1145/1315245.1315294}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DwoskinL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ElbazCLTSG07, author = {Reouven Elbaz and David Champagne and Ruby B. Lee and Lionel Torres and Gilles Sassatelli and Pierre Guillemin}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {TEC-Tree: {A} Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {289--302}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_20}, doi = {10.1007/978-3-540-74735-2\_20}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/ElbazCLTSG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/DwoskinXHCL07, author = {Jeffrey S. Dwoskin and Dahai Xu and Jianwei Huang and Mung Chiang and Ruby B. Lee}, title = {Secure Key Management Architecture Against Sensor-Node Fabrication Attacks}, booktitle = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM} '07, Washington, DC, USA, 26-30 November 2007}, pages = {166--171}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/GLOCOM.2007.39}, doi = {10.1109/GLOCOM.2007.39}, timestamp = {Mon, 19 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/DwoskinXHCL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WangDL07, author = {Zhenghong Wang and Jing Deng and Ruby B. Lee}, title = {Mutual Anonymous Communications: {A} New Covert Channel Based on Splitting Tree {MAC}}, booktitle = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, {USA}}, pages = {2531--2535}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/INFCOM.2007.315}, doi = {10.1109/INFCOM.2007.315}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/WangDL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/WangL07, author = {Zhenghong Wang and Ruby B. Lee}, editor = {Dean M. Tullsen and Brad Calder}, title = {New cache designs for thwarting software cache-based side channel attacks}, booktitle = {34th International Symposium on Computer Architecture {(ISCA} 2007), June 9-13, 2007, San Diego, California, {USA}}, pages = {494--505}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1250662.1250723}, doi = {10.1145/1250662.1250723}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/WangL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/XuHDCL07, author = {Dahai Xu and Jianwei Huang and Jeffrey S. Dwoskin and Mung Chiang and Ruby B. Lee}, title = {Re-examining Probabilistic Versus Deterministic Key Management}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2007, Nice, France, June 24-29, 2007}, pages = {2586--2590}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISIT.2007.4557608}, doi = {10.1109/ISIT.2007.4557608}, timestamp = {Mon, 19 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/XuHDCL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangL06, author = {Zhenghong Wang and Ruby B. Lee}, title = {Covert and Side Channels Due to Processor Architecture}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {473--482}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.20}, doi = {10.1109/ACSAC.2006.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/HilewitzL06, author = {Yedidya Hilewitz and Ruby B. Lee}, title = {Fast Bit Compression and Expansion with Parallel Extract and Parallel Deposit Instructions}, booktitle = {2006 {IEEE} International Conference on Application-Specific Systems, Architecture and Processors {(ASAP} 2006), 11-13 September 2006, Steamboat Springs, Colorado, {USA}}, pages = {65--72}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ASAP.2006.33}, doi = {10.1109/ASAP.2006.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/HilewitzL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/PotlapallyRRJL06, author = {Nachiketh R. Potlapally and Anand Raghunathan and Srivaths Ravi and Niraj K. Jha and Ruby B. Lee}, editor = {Georges G. E. Gielen}, title = {Satisfiability-based framework for enabling side-channel attacks on cryptographic software}, booktitle = {Proceedings of the Conference on Design, Automation and Test in Europe: Designers' Forum, {DATE} 2006, Munich, Germany, March 6-10, 2006}, pages = {18--23}, publisher = {European Design and Automation Association, Leuven, Belgium}, year = {2006}, url = {https://doi.org/10.1109/DATE.2006.244158}, doi = {10.1109/DATE.2006.244158}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/PotlapallyRRJL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsid/PotlapallyRRLJ06, author = {Nachiketh R. Potlapally and Srivaths Ravi and Anand Raghunathan and Ruby B. Lee and Niraj K. Jha}, title = {Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors}, booktitle = {19th International Conference on {VLSI} Design {(VLSI} Design 2006), 3-7 January 2006, Hyderabad, India}, pages = {299--304}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/VLSID.2006.102}, doi = {10.1109/VLSID.2006.102}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vlsid/PotlapallyRRLJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/LeeYS05, author = {Ruby B. Lee and Xiao Yang and Zhijie Shi}, title = {Single-Cycle Bit Permutations with {MOMR} Execution}, journal = {J. Comput. Sci. Technol.}, volume = {20}, number = {5}, pages = {577--585}, year = {2005}, url = {https://doi.org/10.1007/s11390-005-0577-0}, doi = {10.1007/S11390-005-0577-0}, timestamp = {Wed, 20 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/LeeYS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigarch/McGregorL05, author = {John Patrick McGregor and Ruby B. Lee}, title = {Protecting cryptographic keys and computations via virtual secure coprocessing}, journal = {{SIGARCH} Comput. Archit. News}, volume = {33}, number = {1}, pages = {16--26}, year = {2005}, url = {https://doi.org/10.1145/1055626.1055630}, doi = {10.1145/1055626.1055630}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigarch/McGregorL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/LeeF05, author = {Ruby B. Lee and A. Murat Fiskiran}, title = {{PLX:} An Instruction Set Architecture and Testbed for Multimedia Information Processing}, journal = {J. {VLSI} Signal Process.}, volume = {40}, number = {1}, pages = {85--108}, year = {2005}, url = {https://doi.org/10.1007/s11265-005-4940-8}, doi = {10.1007/S11265-005-4940-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vlsisp/LeeF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aPcsac/Lee05, author = {Ruby B. Lee}, editor = {Thambipillai Srikanthan and Jingling Xue and Chip{-}Hong Chang}, title = {Processor Architecture for Trustworthy Computers}, booktitle = {Advances in Computer Systems Architecture, 10th Asia-Pacific Conference, {ACSAC} 2005, Singapore, October 24-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3740}, pages = {1--2}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11572961\_1}, doi = {10.1007/11572961\_1}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/aPcsac/Lee05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/McGregorYL05, author = {John Patrick McGregor and Yiqun Lisa Yin and Ruby B. Lee}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {A Traitor Tracing Scheme Based on {RSA} for Fast Decryption}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {56--74}, year = {2005}, url = {https://doi.org/10.1007/11496137\_5}, doi = {10.1007/11496137\_5}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/McGregorYL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/FiskiranL05, author = {A. Murat Fiskiran and Ruby B. Lee}, title = {On-Chip Lookup Tables for Fast Symmetric-Key Encryption}, booktitle = {16th {IEEE} International Conference on Application-Specific Systems, Architectures, and Processors {(ASAP} 2005), 23-25 July 2005, Samos, Greece}, pages = {356--363}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ASAP.2005.49}, doi = {10.1109/ASAP.2005.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/FiskiranL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/WangL05, author = {Zhenghong Wang and Ruby B. Lee}, title = {Capacity Estimation of Non-Synchronous Covert Channels}, booktitle = {25th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}}, pages = {170--176}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICDCSW.2005.47}, doi = {10.1109/ICDCSW.2005.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/WangL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/LeeKMDW05, author = {Ruby B. Lee and Peter C. S. Kwan and John Patrick McGregor and Jeffrey S. Dwoskin and Zhenghong Wang}, title = {Architecture for Protecting Critical Secrets in Microprocessors}, booktitle = {32st International Symposium on Computer Architecture {(ISCA} 2005), 4-8 June 2005, Madison, Wisconsin, {USA}}, pages = {2--13}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ISCA.2005.14}, doi = {10.1109/ISCA.2005.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/LeeKMDW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WangL05, author = {Zhenghong Wang and Ruby B. Lee}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {498--505}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_37}, doi = {10.1007/11556992\_37}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/WangL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/FiskiranL05, author = {A. Murat Fiskiran and Ruby B. Lee}, title = {Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography}, booktitle = {International Symposium on Information Technology: Coding and Computing {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}}, pages = {526--531}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ITCC.2005.151}, doi = {10.1109/ITCC.2005.151}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/FiskiranL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ISCApdcs/SpechtL04, author = {Stephen M. Specht and Ruby B. Lee}, editor = {David A. Bader and Ashfaq A. Khokhar}, title = {Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures}, booktitle = {Proceedings of the {ISCA} 17th International Conference on Parallel and Distributed Computing Systems, September 15-17, 2004, The Canterbury Hotel, San Francisco, California, {USA}}, pages = {543--550}, publisher = {{ISCA}}, year = {2004}, timestamp = {Mon, 09 Aug 2021 16:35:42 +0200}, biburl = {https://dblp.org/rec/conf/ISCApdcs/SpechtL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aPcsac/LeeYS04, author = {Ruby B. Lee and Xiao Yang and Zhijie Shi}, editor = {Pen{-}Chung Yew and Jingling Xue}, title = {Validating Word-Oriented Processors for Bit and Multi-word Operations}, booktitle = {Advances in Computer Systems Architecture, 9th Asia-Pacific Conference, {ACSAC} 2004, Beijing, China, September 7-9, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3189}, pages = {473--488}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30102-8\_40}, doi = {10.1007/978-3-540-30102-8\_40}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/aPcsac/LeeYS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/FiskiranL04, author = {A. Murat Fiskiran and Ruby B. Lee}, title = {Evaluating Instruction Set Extensions for Fast Arithmetic on Binary Finite Fields}, booktitle = {15th {IEEE} International Conference on Application-Specific Systems, Architectures, and Processors {(ASAP} 2004), 27-29 September 2004, Galveston, TX, {USA}}, pages = {125--136}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.ieeecomputersociety.org/10.1109/ASAP.2004.10003}, doi = {10.1109/ASAP.2004.10003}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/FiskiranL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/RaviKLMR04, author = {Srivaths Ravi and Paul C. Kocher and Ruby B. Lee and Gary McGraw and Anand Raghunathan}, editor = {Sharad Malik and Limor Fix and Andrew B. Kahng}, title = {Security as a new dimension in embedded system design}, booktitle = {Proceedings of the 41th Design Automation Conference, {DAC} 2004, San Diego, CA, USA, June 7-11, 2004}, pages = {753--760}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/996566.996771}, doi = {10.1145/996566.996771}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dac/RaviKLMR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/FiskiranL04, author = {A. Murat Fiskiran and Ruby B. Lee}, title = {Runtime Execution Monitoring {(REM)} to Detect and Prevent Malicious Code Execution}, booktitle = {22nd {IEEE} International Conference on Computer Design: {VLSI} in Computers {\&} Processors {(ICCD} 2004), 11-13 October 2004, San Jose, CA, USA, Proceedings}, pages = {452--457}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ICCD.2004.1347961}, doi = {10.1109/ICCD.2004.1347961}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccd/FiskiranL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/YangL04, author = {Xiao Yang and Ruby B. Lee}, title = {{PLX} {FP:} an efficient floating-point instruction set for 3D graphics}, booktitle = {Proceedings of the 2004 {IEEE} International Conference on Multimedia and Expo, {ICME} 2004, 27-30 June 2004, Taipei, Taiwan}, pages = {137--140}, publisher = {{IEEE} Computer Society}, year = {2004}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/YangL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/LeeSYRR04, author = {Ruby B. Lee and Zhijie Shi and Yiqun Lisa Yin and Ronald L. Rivest and Matthew J. B. Robshaw}, title = {On Permutation Operations in Cipher Design}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {569--577}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286714}, doi = {10.1109/ITCC.2004.1286714}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/LeeSYRR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/micro/MooreRLB03, author = {Charles R. Moore and Kevin W. Rudd and Ruby B. Lee and Pradip Bose}, title = {Guest Editors' Introduction: Micro's Top Picks from Microarchitecture Conferences}, journal = {{IEEE} Micro}, volume = {23}, number = {6}, pages = {8--10}, year = {2003}, url = {https://doi.org/10.1109/MM.2003.1261381}, doi = {10.1109/MM.2003.1261381}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/micro/MooreRLB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/McGregorL03, author = {John Patrick McGregor and Ruby B. Lee}, title = {Architectural techniques for accelerating subword permutations with repetitions}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {11}, number = {3}, pages = {325--335}, year = {2003}, url = {https://doi.org/10.1109/TVLSI.2003.812318}, doi = {10.1109/TVLSI.2003.812318}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvlsi/McGregorL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/Lee03, author = {Ruby B. Lee}, title = {Challenges in the Design of Security-Aware Processors}, booktitle = {14th {IEEE} International Conference on Application-Specific Systems, Architectures, and Processors {(ASAP} 2003), 24-26 June 2003, The Hague, The Netherlands}, pages = {2}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ASAP.2003.1212824}, doi = {10.1109/ASAP.2003.1212824}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/Lee03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/ShiYL03, author = {Zhijie Shi and Xiao Yang and Ruby B. Lee}, title = {Arbitrary Bit Permutations in One or Two Cycles}, booktitle = {14th {IEEE} International Conference on Application-Specific Systems, Architectures, and Processors {(ASAP} 2003), 24-26 June 2003, The Hague, The Netherlands}, pages = {237}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ASAP.2003.1212847}, doi = {10.1109/ASAP.2003.1212847}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/ShiYL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/LeeKMS03, author = {Ruby B. Lee and David K. Karig and John Patrick McGregor and Zhijie Shi}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Enlisting Hardware Architecture to Thwart Malicious Code Injection}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {237--252}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_21}, doi = {10.1007/978-3-540-39881-3\_21}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spc/LeeKMS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/LeeFSY02, author = {Ruby B. Lee and A. Murat Fiskiran and Zhijie Shi and Xiao Yang}, title = {Refining Instruction Set Architecture for High-Performance Multimedia Processing in Constrained Environments}, booktitle = {13th {IEEE} International Conference on Application-Specific Systems, Architectures, and Processors {(ASAP} 2002), 17-19 July 2002, San Jose, CA, {USA}}, pages = {253--264}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ASAP.2002.1030724}, doi = {10.1109/ASAP.2002.1030724}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/LeeFSY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/ShiL02, author = {Zhijie Shi and Ruby B. Lee}, title = {Subword Sorting with Versatile Permutation Instructions}, booktitle = {20th International Conference on Computer Design {(ICCD} 2002), {VLSI} in Computers and Processors, 16-18 September 2002, Freiburg, Germany, Proceedings}, pages = {234--241}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ICCD.2002.1106776}, doi = {10.1109/ICCD.2002.1106776}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccd/ShiL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/LeeF02, author = {Ruby B. Lee and A. Murat Fiskiran}, title = {{PLX:} a fully subword-parallel instruction set architecture for fast scalable multimedia processing}, booktitle = {Proceedings of the 2002 {IEEE} International Conference on Multimedia and Expo, {ICME} 2002, Lausanne, Switzerland. August 26-29, 2002. Volume {II}}, pages = {117--120}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ICME.2002.1035526}, doi = {10.1109/ICME.2002.1035526}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/LeeF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/micro/LeeSY01, author = {Ruby B. Lee and Zhijie Shi and Xiao Yang}, title = {Cryptography Efficient Permutation Instructions for Fast Software}, journal = {{IEEE} Micro}, volume = {21}, number = {6}, pages = {56--69}, year = {2001}, url = {https://doi.org/10.1109/40.977759}, doi = {10.1109/40.977759}, timestamp = {Wed, 20 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/micro/LeeSY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/Lee01, author = {Ruby B. Lee}, title = {Computer Arithmetic-A Processor Architect's Perspective}, booktitle = {15th {IEEE} Symposium on Computer Arithmetic (Arith-15 2001), 11-17 June 2001, Vail, CO, {USA}}, pages = {3}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.ieeecomputersociety.org/10.1109/ARITH.2001.10003}, doi = {10.1109/ARITH.2001.10003}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arith/Lee01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/McGregorL01, author = {John Patrick McGregor and Ruby B. Lee}, title = {Architectural Enhancements for Fast Subword Permutations with Repetitions in Cryptographic Applications}, booktitle = {19th International Conference on Computer Design {(ICCD} 2001), {VLSI} in Computers and Processors, 23-26 September 2001, Austin, TX, USA, Proceedings}, pages = {453--461}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ICCD.2001.955065}, doi = {10.1109/ICCD.2001.955065}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccd/McGregorL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/FiskiranL01, author = {A. Murat Fiskiran and Ruby B. Lee}, title = {Performance Impact of Addressing Modes on Encryption Algorithms}, booktitle = {19th International Conference on Computer Design {(ICCD} 2001), {VLSI} in Computers and Processors, 23-26 September 2001, Austin, TX, USA, Proceedings}, pages = {542--545}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ICCD.2001.955088}, doi = {10.1109/ICCD.2001.955088}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccd/FiskiranL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/LeeFB01, author = {Ruby B. Lee and A. Murat Fiskiran and Abdulla Bubsha}, title = {Multimedia Instructions In {IA-64}}, booktitle = {Proceedings of the 2001 {IEEE} International Conference on Multimedia and Expo, {ICME} 2001, August 22-25, 2001, Tokyo, Japan}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ICME.2001.1237694}, doi = {10.1109/ICME.2001.1237694}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/LeeFB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ZuckerLF00, author = {Daniel F. Zucker and Ruby B. Lee and Michael J. Flynn}, title = {Hardware and software cache prefetching techniques for {MPEG} benchmarks}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {10}, number = {5}, pages = {782--796}, year = {2000}, url = {https://doi.org/10.1109/76.856455}, doi = {10.1109/76.856455}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/ZuckerLF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/Lee00, author = {Ruby B. Lee}, title = {Subword Permutation Instructions for Two-Dimensional Multimedia Processing in MicroSIMD Architectures}, booktitle = {12th {IEEE} International Conference on Application-Specific Systems, Architectures, and Processors {(ASAP} 2000), 10-12 July 2000, Boston, MA, {USA}}, pages = {3--14}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ASAP.2000.862373}, doi = {10.1109/ASAP.2000.862373}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/Lee00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/ShiL00, author = {Zhijie Shi and Ruby B. Lee}, title = {Bit Permutation Instructions for Accelerating Software Cryptography}, booktitle = {12th {IEEE} International Conference on Application-Specific Systems, Architectures, and Processors {(ASAP} 2000), 10-12 July 2000, Boston, MA, {USA}}, pages = {138--148}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ASAP.2000.862385}, doi = {10.1109/ASAP.2000.862385}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/ShiL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/YangL00, author = {Xiao Yang and Ruby B. Lee}, title = {Fast Subword Permutation Instructions Using Omega and Flip Network Stages}, booktitle = {Proceedings of the {IEEE} International Conference On Computer Design: {VLSI} In Computers {\&} Processors, {ICCD} '00, Austin, Texas, USA, September 17-20, 2000}, pages = {15--21}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ICCD.2000.878264}, doi = {10.1109/ICCD.2000.878264}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccd/YangL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/LuoL00, author = {Zhen Luo and Ruby B. Lee}, title = {Cost-effective multiplication with enhanced adders for multimedia applications}, booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2000, Emerging Technologies for the 21st Century, Geneva, Switzerland, 28-31 May 2000, Proceedings}, pages = {651--654}, publisher = {{IEEE}}, year = {2000}, url = {https://doi.org/10.1109/ISCAS.2000.857179}, doi = {10.1109/ISCAS.2000.857179}, timestamp = {Fri, 13 Aug 2021 09:26:01 +0200}, biburl = {https://dblp.org/rec/conf/iscas/LuoL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/McGregorL00, author = {John Patrick McGregor and Ruby B. Lee}, title = {Performance Impact of Data Compression on Virtual Private Network Transactions}, booktitle = {Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000}, pages = {500--510}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/LCN.2000.891091}, doi = {10.1109/LCN.2000.891091}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/McGregorL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ZuckerLFF98, author = {Daniel F. Zucker and Ruby B. Lee and Michael J. Flynn}, title = {An Automated Method for Software Controlled Cache Prefetching}, booktitle = {Thirty-First Annual Hawaii International Conference on System Sciences, Kohala Coast, Hawaii, USA, January 6-9, 1998}, pages = {106--114}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/HICSS.1998.649189}, doi = {10.1109/HICSS.1998.649189}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/ZuckerLFF98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ConteDJLPRSSW97, author = {Thomas M. Conte and Pradeep K. Dubey and Matthew D. Jennings and Ruby B. Lee and Alex Peleg and Salliah Rathnam and Michael S. Schlansker and Peter Song and Andrew Wolfe}, title = {Challenges to Combining General-Purpose and Multimedia Processors}, journal = {Computer}, volume = {30}, number = {12}, pages = {33--37}, year = {1997}, url = {https://doi.org/10.1109/2.642799}, doi = {10.1109/2.642799}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ConteDJLPRSSW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compcon/YuLF97, author = {Alice Yu and Ruby B. Lee and Michael J. Flynn}, title = {An evaluation of video fidelity metrics}, booktitle = {Proceedings {IEEE} {COMPCON} 97, San Jose, California, USA, February 23-26, 1997, Digest of Papers}, pages = {49--55}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/CMPCON.1997.584670}, doi = {10.1109/CMPCON.1997.584670}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compcon/YuLF97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compcon/WongTHML97, author = {Ping Wah Wong and Daniel Tretter and Cormac Herley and Nader Moayeri and Ruby B. Lee}, title = {Image processing considerations for digital photography}, booktitle = {Proceedings {IEEE} {COMPCON} 97, San Jose, California, USA, February 23-26, 1997, Digest of Papers}, pages = {280--285}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/CMPCON.1997.584730}, doi = {10.1109/CMPCON.1997.584730}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compcon/WongTHML97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/YuLF97, author = {Alice Yu and Ruby B. Lee and Michael J. Flynn}, editor = {Ephraim P. Glinert and Mark Scott Johnson and Jim Foley and Jim Hollan}, title = {Performance Enhancement of {H.263} Encoder Based on Zero Coefficient Prediction}, booktitle = {Proceedings of the Fifth {ACM} International Conference on Multimedia '97, Seattle, WA, USA, November 9-13, 1997}, pages = {21--29}, publisher = {{ACM} Press}, year = {1997}, url = {https://doi.org/10.1145/266180.266326}, doi = {10.1145/266180.266326}, timestamp = {Wed, 21 Jul 2021 12:11:06 +0200}, biburl = {https://dblp.org/rec/conf/mm/YuLF97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/micro/LeeS96, author = {Ruby B. Lee and Michael D. Smith}, title = {Guest Editorial: Media processing: a new design target}, journal = {{IEEE} Micro}, volume = {16}, number = {4}, pages = {6--9}, year = {1996}, url = {https://doi.org/10.1109/MM.1996.526920}, doi = {10.1109/MM.1996.526920}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/micro/LeeS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/micro/Lee96, author = {Ruby B. Lee}, title = {Subword parallelism with {MAX-2}}, journal = {{IEEE} Micro}, volume = {16}, number = {4}, pages = {51--59}, year = {1996}, url = {https://doi.org/10.1109/40.526925}, doi = {10.1109/40.526925}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/micro/Lee96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compcon/LeeH96, author = {Ruby B. Lee and Jerome C. Huck}, title = {64-bit and Multimedia Extensions in the {PA-RISC} 2.0 Architecture}, booktitle = {Forty-First {IEEE} Computer Society International Conference: Technologies for the Information Superhighway, {COMPCON} 1996, Santa Clara, California, USA, February 25-28, 1996, Digest of Papers}, pages = {152--160}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/CMPCON.1996.501762}, doi = {10.1109/CMPCON.1996.501762}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compcon/LeeH96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compcon/ZuckerFL96, author = {Daniel F. Zucker and Michael J. Flynn and Ruby B. Lee}, title = {Improving Performance for {MPEG} Players}, booktitle = {Forty-First {IEEE} Computer Society International Conference: Technologies for the Information Superhighway, {COMPCON} 1996, Santa Clara, California, USA, February 25-28, 1996, Digest of Papers}, pages = {327--332}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/CMPCON.1996.501791}, doi = {10.1109/CMPCON.1996.501791}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compcon/ZuckerFL96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/ZuckerFL96, author = {Daniel F. Zucker and Michael J. Flynn and Ruby B. Lee}, title = {A Comparison of Hardware Prefetching Techniques for Mulimedia Benchmarks}, booktitle = {Proceedings of the {IEEE} International Conference on Multimedia Computing and Systems, {ICMCS} 1996, Hiroshima, Japan, June 17-23, 1996}, pages = {236--244}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/MMCS.1996.534981}, doi = {10.1109/MMCS.1996.534981}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/ZuckerFL96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/micro/Lee95, author = {Ruby B. Lee}, title = {Accelerating multimedia with enhanced microprocessors}, journal = {{IEEE} Micro}, volume = {15}, number = {2}, pages = {22--32}, year = {1995}, url = {https://doi.org/10.1109/40.372347}, doi = {10.1109/40.372347}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/micro/Lee95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/BhaskaranKLB95, author = {Vasudev Bhaskaran and Konstantine Konstantinides and Ruby B. Lee and John P. Beck}, title = {Algorithmic and architectural enhancements for real-time {MPEG-1} decoding on a general purpose {RISC} workstation}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {5}, number = {5}, pages = {380--386}, year = {1995}, url = {https://doi.org/10.1109/76.473548}, doi = {10.1109/76.473548}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/BhaskaranKLB95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compcon/Lee95, author = {Ruby B. Lee}, title = {Realtime {MPEG} Video via Software Decompression oon a {PA-RISC} Processor}, booktitle = {{COMPCON} '95: Technologies for the Information Superhighway, Digest of Papers, San Francisco, California, USA, March 5-9, 1995}, pages = {186--192}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/CMPCON.1995.512384}, doi = {10.1109/CMPCON.1995.512384}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compcon/Lee95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Lee89, author = {Ruby B. Lee}, title = {Precision Architecture}, journal = {Computer}, volume = {22}, number = {1}, pages = {78--91}, year = {1989}, url = {https://doi.org/10.1109/2.19825}, doi = {10.1109/2.19825}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Lee89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.