Publications

Export (86) results:[Tagged][XML][BibTex]
Sort by:[Year][Title][Type][Author]
Filters: author is Ruby B. Lee  [Clear All Filters]
T
Zhang, T., Lee, R.B., "Monitoring and Attestation of Virtual Machine Security Health in Cloud Computing", IEEE Micro Special Issues on Security, vol. 36, issue 5, Sept/Oct 2016. Abstract Tagged XML BibTex
Zhang, T., Lee, R.B., "CloudMonatt: an Architecture for Security Health Monitoring and Attestation of Virtual Machines in Cloud Computing", Proceedings of The 42nd International Symposium on Computer Architecture, Portland, pp. 362-274, June 2015. Tagged XML BibTex
Zhang, T., Lee, R.B., "New Models of Cache Architectures Characterizing Information Leakage from Cache Side", Proceedings of Annual Computer Security Applications Conference (ACSAC), December 2014, pp. 96-105, 2014  . Tagged XML BibTex
Zhang, T., Chen, S., Liu, F., Lee, R.B., "Side Channel Vulnerability Metrics: the Promise and the Pitfalls", in Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), June 24, 2013. Tagged XML BibTex
Zhang, T., Szefer, J., Lee, R.B., "Security Verification of Hardware-enabled Attestation Protocols", in Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), December 2012. Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and benefits of suboptimal utility maximization", IEEE/ACM Transactions on Networking, vol. 19, issue 4, 2011  . Abstract Tagged XML BibTex
Levin, T., Dwoskin, J., Bhaskara, G., Nguyen, T., Clark, P., Lee, R.B., Irvine, C., Benzel, T., "Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture", 2nd International Conference on Trusted Computing (TRUST 2009), Oxford, U.K., pp. 133-156, April 2009. Abstract Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., "Multi-path Key Establishment Against REM Attacks in Wireless Ad Hoc Networks", IEEE Global Communications Conference (GLOBECOM 2009), Honolulu, Hawaii, USA, Nov/Dec 2009. Abstract Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "How Bad is Suboptimal Rate Allocation?", Proceedings of the 27th. Conference on Computer Communications, IEEE (INFOCOM ’08), pp. 951-959, April 13-18 2008. Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and Benefits of Suboptimal Utility Maximization", submitted to IEEE Transactions on Networking, Nov. 4. Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., Multi-path Key Establishment under Byzantine Attacks in Wireless Ad Hoc Networks, , 2008  . Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., Reliable and Secure Distributed Storage of Critical Information, , 2008  . Tagged XML BibTex
W
Lee, W., Ortiz, J., Ko, B., Lee, R.B., "Inferring Smartphone Users' Handwritten Patterns by Using Motion Sensors (Best Paper Award)", 4th Internation Conference on Information System Security and Privacy, Funchal, Madeira, Portugal, 22/01/2018. Abstract Tagged XML BibTex
Lee, W., Liu, C., Ji, S., Mittal, P., Lee, R.B., "Blind De-anonymization Attacks using Social Networks", Workshop on Privacy in the Electronic Society (WPES), Dallas, ACM, 30/10/2017. Abstract Tagged XML BibTex
Lee, W., Liu, C., Ji, S., Mittal, P., Lee, R.B., "How to Quantify Graph De-anonymization Risks", Springer Information Systems Security and Privacy: Springer, 2017  . Tagged XML BibTex
Lee, W., Lee, R.B., "Implicit Sensor-based Authentication of Smartphone Users with Smartwatch", Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), June 2016. Abstract Tagged XML BibTex
Lee, W., Lee, R.B., "Multi-sensor authentication to improve smartphone security", Proceedings of International Conference on Information Systems Security and Privacy, February 2015. Abstract Tagged XML BibTex
Lee, W., Lee, R.B., "Implicit Authentication for Smartphone Security", Information Systems Security and Privacy, vol. 576: Springer, pp. 160-176, 2015  . Abstract Tagged XML BibTex
Zhang, W., Szefer, J.M., Chen, Y., Yu, C., Li, W.X.Y., Cheung, R.C.C., Lee, R.B., "Design of Short Ring Oscillator-Based True Random Number Generator on FPGA Platform", Princeton University Department of Electrical Engineering Technical Report CE-L2011-006 (updated Dec. 8, 2011), Sept. 20, 2011. Tagged XML BibTex
Y
Shalabi, Y., Yan, M., Honarmand, N., Lee, R.B., Torrellas, J., "Record-Replay Architecture as a General Security Framework", IEEE International Symposium on High-Performance Computer Architecture (HPCA), Vienna, Austria, IEEE, 24/02/2018. Tagged XML BibTex
Yarom, Y., Ge, Q., Liu, F., Lee, R.B., Heiser, G., "Mapping the Intel Last-Level Cache", IACR Cryptology ePrint Archive, Report 2015/905, 2015  . Tagged XML BibTex
Chen, Y., Jamkhedkar, P.A., Lee, R.B., "A Software-Hardware Architecture for Self-Protecting Data", 19th ACM conference on Computer and Communications Security, Raleigh, NC, USA, October 16-18. Abstract Tagged XML BibTex
Chen, Y., Lee, R.B., "DataMoat: Architectural Support for Self-Protecting Data", Princeton University Department of Electrical Engineering Technical Report CE-L2011-002 (updated June 1, 2011), Feb. 10, 2011. Tagged XML BibTex
Chen, Y., Jamkhedkar, P., Lee, R.B., "Running Untrusted Applications on Sensitive Data", Princeton University Department of Electrical Engineering Technical Report CE-L2011-007, Nov. 16, 2011. Tagged XML BibTex
Chen, Y., Dwoskin, J.S., Gomathisankaran, M., Lee, R.B., "Making Security Validation as Easy as Performance Evaluation", Princeton University Department of Electrical Engineering Technical Report CE-L2009-005, November 2009. Tagged XML BibTex