Search Results - "Kinsy, Michel A"

Refine Results
  1. 1

    Computer Engineering Education Experiences with RISC-V Architectures—From Computer Architecture to Microcontrollers by Jamieson, Peter, Le, Huan, Martin, Nathan, McGrew, Tyler, Qian, Yicheng, Schonauer, Eric, Ehret, Alan, Kinsy, Michel A.

    “…With the growing popularity of RISC-V and various open-source released RISC-V processors, it is now possible for computer engineers students to explore this…”
    Get full text
    Journal Article
  2. 2

    Designing Secure Heterogeneous Multicore Systems from Untrusted Components by Kinsy, Michel, Bu, Lake, Isakov, Mihailo, Mark, Miguel

    Published in Cryptography (01-09-2018)
    “…In current systems-on-chip (SoCs) designs, processing elements, i.e., intellectual property (IP) cores, may come from different providers, and executable code…”
    Get full text
    Journal Article
  3. 3

    Design Space Exploration of Neural Network Activation Function Circuits by Yang, Tao, Wei, Yadong, Tu, Zhijun, Zeng, Haolun, Kinsy, Michel A., Zheng, Nanning, Ren, Pengju

    “…The widespread application of artificial neural networks has prompted researchers to experiment with field-programmable gate array and customized ASIC designs…”
    Get full text
    Journal Article
  4. 4

    Addressing a New Class of Reliability Threats in 3-D Network-on-Chips by Taheri, Ebadollah, Isakov, Mihailo, Patooghy, Ahmad, Kinsy, Michel A.

    “…Network-on-chips (NoCs) are vulnerable to transient and permanent faults caused by thermal violations, aging effects, component wear out, or even transient…”
    Get full text
    Journal Article
  5. 5

    Bulwark: Securing implantable medical devices communication channels by Bu, Lake, Karpovsky, Mark G., Kinsy, Michel A.

    Published in Computers & security (01-09-2019)
    “…•This work introduces a design of secure wireless transmission channel for implantable medical devices (IMDs).•The proposed technique is able to protect the…”
    Get full text
    Journal Article
  6. 6

    Adaptive caches as a defense mechanism against cache side-channel attacks by Bandara, Sahan, Kinsy, Michel A.

    Published in Journal of cryptographic engineering (01-09-2021)
    “…Side-channel attacks exploit architectural features of computing systems and algorithmic properties of applications executing on these systems to steal…”
    Get full text
    Journal Article
  7. 7

    NeuroFabric: Hardware and ML Model Co-Design for A Priori Sparse Neural Network Training by Isakov, Mihailo, Kinsy, Michel A.

    “…Sparse Deep Neural Networks (DNN) offer a large improvement in model storage requirements, execution latency and execution throughput. DNN pruning is…”
    Get full text
    Conference Proceeding
  8. 8

    RASSS: a hijack‐resistant confidential information management scheme for distributed systems by Bu, Lake, Isakov, Mihailo, Kinsy, Michel A

    “…In distributed systems there is often a need to store and share sensitive information (e.g., encryption keys, digital signatures, login credentials etc.) among…”
    Get full text
    Journal Article
  9. 9

    Fault-Aware Load-Balancing Routing for 2D-Mesh and Torus On-Chip Network Topologies by Pengju Ren, Kinsy, Michel A., Nanning Zheng

    Published in IEEE transactions on computers (01-03-2016)
    “…Routing algorithm design for on-chip networks (OCNs) has become increasingly challenging due to high levels of integration and complexity of modern…”
    Get full text
    Journal Article
  10. 10

    Quantum-Proof Lightweight McEliece Cryptosystem Co-processor Design by Agrawal, Rashmi, Bu, Lake, Kinsy, Michel A.

    “…Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction…”
    Get full text
    Conference Proceeding
  11. 11

    A Deadlock-Free and Connectivity-Guaranteed Methodology for Achieving Fault-Tolerance in On-Chip Networks by Pengju Ren, Xiaowei Ren, Sane, Sudhanshu, Kinsy, Michel A., Nanning Zheng

    Published in IEEE transactions on computers (01-02-2016)
    “…To improve the reliability of on-chip network based systems, we design a deadlock-free routing technique that is more resilient to component failures and…”
    Get full text
    Journal Article
  12. 12

    Design of reliable storage and compute systems with lightweight group testing based non‐binary error correction codes by Bu, Lake, Karpovsky, Mark G, Kinsy, Michel A

    “…In this study, the authors propose a new group testing based (GTB) error control codes (ECCs) approach for improving the reliability of memory structures in…”
    Get full text
    Journal Article
  13. 13

    Design-flow Methodology for Secure Group Anonymous Authentication by Agrawal, Rashmi, Bu, Lake, Rosario, Eliakin Del, Kinsy, Michel A.

    “…In heterogeneous distributed systems, computing devices and software components often come from different providers and have different security, trust, and…”
    Get full text
    Conference Proceeding
  14. 14

    Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures by Dessouky, Ghada, Isakov, Mihailo, Kinsy, Michel A., Mahmoody, Pouya, Mark, Miguel, Sadeghi, Ahmad-Reza, Stapf, Emmanuel, Zeitouni, Shaza

    “…Emerging applications, like cloud services, are demanding more computational power, while also giving rise to various security and privacy challenges. Current…”
    Get full text
    Conference Proceeding
  15. 15

    SRASA: a Generalized Theoretical Framework for Security and Reliability Analysis in Computing Systems by Bu, Lake, Dofe, Jaya, Yu, Qiaoyan, Kinsy, Michel A.

    Published in Journal of hardware and systems security (01-09-2019)
    “…Although there is a pressing need for highly secure and reliable computing systems, there is a glaring lack of formalism under which the properties of…”
    Get full text
    Journal Article
  16. 16

    Optimal and Heuristic Application-Aware Oblivious Routing by Kinsy, M. A., Myong Hyon Cho, Keun Sup Shim, Lis, M., Suh, G. E., Devadas, S.

    Published in IEEE transactions on computers (01-01-2013)
    “…Conventional oblivious routing algorithms do not take into account resource requirements (e.g., bandwidth, latency) of various flows in a given application. As…”
    Get full text
    Journal Article
  17. 17

    A Compiler for Transparent Namespace-Based Access Control for the Zeno Architecture by Abraham, Jacob, Ehret, Alan, Kinsy, Michel A.

    “…With memory safety and security issues continuing to plague modern systems, security is rapidly becoming a first class priority in new architectures and…”
    Get full text
    Conference Proceeding
  18. 18

    Survey of Attacks and Defenses on Edge-Deployed Neural Networks by Isakov, Mihailo, Gadepally, Vijay, Gettings, Karen M., Kinsy, Michel A.

    “…Deep Neural Network (DNN) workloads are quickly moving from datacenters onto edge devices, for latency, privacy, or energy reasons. While datacenter networks…”
    Get full text
    Conference Proceeding
  19. 19

    A Post-Quantum Secure Discrete Gaussian Noise Sampler by Agrawal, Rashmi, Bu, Lake, Kinsy, Michel A.

    “…While the notion of achieving "quantum supremacy" may be debatable, rapid developments in the field of quantum computing are heading towards more realistic…”
    Get full text
    Conference Proceeding
  20. 20

    Hardware Root-of-Trust Support for Operational Technology Cybersecurity in Critical Infrastructures by Ehret, Alan, Moore, Peter, Stojkov, Milan, Kinsy, Michel A.

    “…Operational technology (OT) systems use hardware and software to monitor and control physical processes, devices, and infrastructure - often critical…”
    Get full text
    Conference Proceeding