Publications

Export (179) results:[Tagged][XML][BibTex]
Sort by:[Year][Title][Type][Author]
Filters: author is Lee  [Clear All Filters]
W
Fiskiran, M., Lee, R.B., "Workload Characterization of Elliptic Curve Cryptography and other Network Security Algorithms for Constrained Environments", Proceedings of the 5th IEEE Annual Workshop on Workload Characterization (WWC-5), Austin, Texas, USA, pp. 127-137, Nov. 2002. Tagged XML BibTex
V
Bhaskara, G., Levin, T.E., Nguyen, T.D., Irvine, C.E., Benzel, T.V., Dwoskin, J.S., Lee, R.B., "Virtualization of a Processor-based Crypto-Protection Mechanism and Integration within a Separation Kernel Architecture", Princeton University Department of Electrical Engineering Technical Report CE-L2006-006, November 2006. Tagged XML BibTex
Lee, R.B., Yang, X., Shi, Z.J., "Validating Word-oriented Processors for Bit and Multi-Word Operations", Proceedings of the Asia-Pacific Computer Systems Architecture Conference (ACSAC 2004), Beijing, China, pp. 473-488, Sept. 2004. Tagged XML BibTex
U
Lee, R.B., "Using Moving Target Defense for Secure Hardware Design", Princeton University Department of Electrical Engineering Technical Report CE-L2016-002, 2016  . Tagged XML BibTex
Ruby Lee, P.K., UserMode SP_ISCA2005, , 2005  . Tagged XML BibTex
T
Szefer, J., Bau, J., Mitchell, J.C., Lee, R.B., "Trust but Verify: Trust Evidence for Hypervisor-Secure Virtualization", Princeton University Department of Electrical Engineering Technical Report CE-L2011-008, Nov. 16, 2011. Tagged XML BibTex
Ho, C.H., Luk, W., Szefer, J.M., Lee, R.B., "Tuning Instruction Customisation for Reconfigurable System-on-Chip", Proceedings of the 22nd IEEE International SOC Conference, Sept. 9-11, 2009. Abstract Tagged XML BibTex
Champagne, D., Elbaz, R., Lee, R.B., "The Reduced Address Space for Application Memory Authentication", Proceedings of the 11th Information Security Conference (ISC'08), September 2008. Tagged XML BibTex
Elbaz, R., Champagne, D., Lee, R.B., Torres, L., Sassatelli, G., Guillemin, P., "TEC-Tree: A Low Cost, Parallelizable Tree for Efficient Defense against Memory Replay Attacks", Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), Vienna, Austria, pp. 289-302, September 2007. Abstract Tagged XML BibTex
Elbaz, R., Champagne, D., Lee, R.B., TEC-Tree: A Low Cost and Parallelizable Tree for Efficient Defense against Memory Replay Attacks, , Princeton University Department of Electrical Engineering Technical Report CE-L2007-002, March 2007. Tagged XML BibTex
S
Hu, G., He, Z., Lee, R.B., "Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support", TinyML Research Symposium, 2021  . Tagged XML BibTex
Hu, G., He, Z., Lee, R.B., "SoK: Hardware Defenses Against Speculative Execution Attacks", IEEE International Symposium on Secure and Private Execution Environment Design, 2021  . Abstract Tagged XML BibTex
He, Z., Zhang, T., Lee, R., "Sensitive-sample Fingerprinting of Deep Neural Networks", IEEE Conference on Computer Vision and Pattern Recognition (CVPR): IEEE, 15/06/2019. Tagged XML BibTex
Schaumont, P., Lee, R., Perez, R., Bertoni, G., "Special Section on Secure Computer Architectures", IEEE Transactions on Computers, vol. 67, issue 3, March 2018. Tagged XML BibTex
Lee, W., Liu, X., Shen, Y., Jin, H., Lee, R., "Secure Pick Up: Implicit Authentication When You Start Using the Smartphone", ACM Symposium on Access Control Models and Technologies (SACMAT) , Indianapolis, 06/21/2017. Abstract Tagged XML BibTex
Liu, F., Lee, R.B., "Security Testing of a Secure Cache Design", in Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), June 24, 2013. Tagged XML BibTex
Zhang, T., Chen, S., Liu, F., Lee, R.B., "Side Channel Vulnerability Metrics: the Promise and the Pitfalls", in Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), June 24, 2013. Tagged XML BibTex
Zhang, T., Szefer, J., Lee, R.B., "Security Verification of Hardware-enabled Attestation Protocols", in Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), December 2012. Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and benefits of suboptimal utility maximization", IEEE/ACM Transactions on Networking, vol. 19, issue 4, 2011  . Abstract Tagged XML BibTex
Champagne, D., Lee, R.B., "Scalable Architectural Support for Trusted Software", The 16th IEEE International Symposium on High-Performance Computer Architecture (HPCA), Bangalore, India, Jan 9-14 2010. Abstract Tagged XML BibTex
Levin, T., Dwoskin, J., Bhaskara, G., Nguyen, T., Clark, P., Lee, R.B., Irvine, C., Benzel, T., "Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture", 2nd International Conference on Trusted Computing (TRUST 2009), Oxford, U.K., pp. 133-156, April 2009. Abstract Tagged XML BibTex
Dwoskin, J.S., Gomathisankaran, M., Champagne, D., Lee, R.B., "SP Reference Manual Addendum -- Secure Stacks for TSMs and Emulation of SP Interrupt Protection", Princeton University Department of Electrical Engineering Technical Report CE-L2009-006, August 2009. Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and Benefits of Suboptimal Utility Maximization", submitted to IEEE Transactions on Networking, Nov. 4. Tagged XML BibTex
Dwoskin, J.S., Bhaskara, G., Nguyen, T.D., Lee, R.B., "SecureCore Prototype/Demo Manual", Princeton University Department of Electrical Engineering Technical Report CE-L2008-009, August 2008. Tagged XML BibTex
Dwoskin, J.S., Lee, R.B., "SP Processor Architecture Reference Manual", Princeton University Department of Electrical Engineering Technical Report CE-L2008-008, August 2008. Tagged XML BibTex