HW Security An Efficient Hardware/Software Co-design for FALCON on Low-End Embedded Systems, IEEE Access, April 2024
|
HW Security Optimizing Hardware Resource Utilization for Accelerating the NTRU-KEM Algorithm, Computers, Dec 2023
|
HW Security Area-Efficient Accelerator for the Full NTRU-KEM Algorithm, ICCSA 2023
|
HW Security Accelerating N-bit Operations over TFHE on Commodity CPU-FPGA, ICCAD 2022
|
HW Security A Hardware Platform for Ensuring OS Kernel Integrity on RISC-V, MDPI Electronics, August 2021
|
HW Security Ambassy: A Runtime Framework to Delegate Trusted Applications in an ARM/FPGA Hybrid System (early access), IEEE Transactions on Mobile Computing (TMC), Jun 2021
|
HW Security MeetGo: A Trusted Execution Environment for Remote Applications on FPGA (early access), IEEE Access, Mar 2021
|
HW Security A Metadata-driven Approach to Efficiently Detect Code Reuse Attacks on ARM Multiprocessors, The Journal of Supercomputing, Jan 2021
|
HW Security TRUSTORE: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGA, ACM Conference on Computer and Communications Security (CCS), Nov 2020
|
HW Security MeetGo: A Reconfigurable HW TEE to Build Secure Cryptocurrency Wallet for Remote Users, Design Automation Conference (DAC) WIP, Jul 2020
|
HW Security ActiMon: Unified JOP and ROP Detection With Active Function Lists on an SoC FPGA, IEEE Access, Dec 2019
|
HW Security Design of a Generic Security Interface for RISC-V Processors and its Applications, 2018 International SoC Design Conference (ISOCC), Nov 2018
|
HW Security RiskiM: Towards Complete Kernel Protection with Hardware Support, DATE, Mar 2019
|
HW Security Hardware Assisted Randomization of Data, International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Sep 2018
|
HW Security Hypernel: A Hardware-Assisted Framework for Kernel Protection without Nested Paging, Annual Design Automation Conference (DAC), Jun 2018
|
HW Security A Dynamic Per-context Verification of Kernel Address Integrity from External Monitors, Computers & Security, August 2018
|
HW Security Architectural Supports to Protect OS Kernels from Code-Injection Attacks and Their Applications, ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, Oct 2017
|
HW Security Hardware-assisted Efficient Long Branch Tracing for Control Flow Integrity on x86 Processors, Design Automation Conference WIP, Jun 2017
|
HW Security Using CoreSight PTM to Integrate CRA Monitoring IPs in an ARM-Based SoC, ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, May 2017
|
HW Security Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping, IEEE Transactions on Dependable and Secure Computing, Apr 2017
|