Search Results - "Kinsy, Michel A"
-
1
Computer Engineering Education Experiences with RISC-V Architectures—From Computer Architecture to Microcontrollers
Published in Journal of low power electronics and applications (01-09-2022)“…With the growing popularity of RISC-V and various open-source released RISC-V processors, it is now possible for computer engineers students to explore this…”
Get full text
Journal Article -
2
Designing Secure Heterogeneous Multicore Systems from Untrusted Components
Published in Cryptography (01-09-2018)“…In current systems-on-chip (SoCs) designs, processing elements, i.e., intellectual property (IP) cores, may come from different providers, and executable code…”
Get full text
Journal Article -
3
Design Space Exploration of Neural Network Activation Function Circuits
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01-10-2019)“…The widespread application of artificial neural networks has prompted researchers to experiment with field-programmable gate array and customized ASIC designs…”
Get full text
Journal Article -
4
Addressing a New Class of Reliability Threats in 3-D Network-on-Chips
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01-07-2020)“…Network-on-chips (NoCs) are vulnerable to transient and permanent faults caused by thermal violations, aging effects, component wear out, or even transient…”
Get full text
Journal Article -
5
Bulwark: Securing implantable medical devices communication channels
Published in Computers & security (01-09-2019)“…•This work introduces a design of secure wireless transmission channel for implantable medical devices (IMDs).•The proposed technique is able to protect the…”
Get full text
Journal Article -
6
Adaptive caches as a defense mechanism against cache side-channel attacks
Published in Journal of cryptographic engineering (01-09-2021)“…Side-channel attacks exploit architectural features of computing systems and algorithmic properties of applications executing on these systems to steal…”
Get full text
Journal Article -
7
NeuroFabric: Hardware and ML Model Co-Design for A Priori Sparse Neural Network Training
Published in 2022 IEEE 40th International Conference on Computer Design (ICCD) (01-10-2022)“…Sparse Deep Neural Networks (DNN) offer a large improvement in model storage requirements, execution latency and execution throughput. DNN pruning is…”
Get full text
Conference Proceeding -
8
RASSS: a hijack‐resistant confidential information management scheme for distributed systems
Published in Chronic diseases and translational medicine (01-05-2019)“…In distributed systems there is often a need to store and share sensitive information (e.g., encryption keys, digital signatures, login credentials etc.) among…”
Get full text
Journal Article -
9
Fault-Aware Load-Balancing Routing for 2D-Mesh and Torus On-Chip Network Topologies
Published in IEEE transactions on computers (01-03-2016)“…Routing algorithm design for on-chip networks (OCNs) has become increasingly challenging due to high levels of integration and complexity of modern…”
Get full text
Journal Article -
10
Quantum-Proof Lightweight McEliece Cryptosystem Co-processor Design
Published in 2020 IEEE 38th International Conference on Computer Design (ICCD) (01-10-2020)“…Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction…”
Get full text
Conference Proceeding -
11
A Deadlock-Free and Connectivity-Guaranteed Methodology for Achieving Fault-Tolerance in On-Chip Networks
Published in IEEE transactions on computers (01-02-2016)“…To improve the reliability of on-chip network based systems, we design a deadlock-free routing technique that is more resilient to component failures and…”
Get full text
Journal Article -
12
Design of reliable storage and compute systems with lightweight group testing based non‐binary error correction codes
Published in Chronic diseases and translational medicine (01-05-2019)“…In this study, the authors propose a new group testing based (GTB) error control codes (ECCs) approach for improving the reliability of memory structures in…”
Get full text
Journal Article -
13
Design-flow Methodology for Secure Group Anonymous Authentication
Published in 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE) (01-03-2020)“…In heterogeneous distributed systems, computing devices and software components often come from different providers and have different security, trust, and…”
Get full text
Conference Proceeding -
14
Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures
Published in 2021 58th ACM/IEEE Design Automation Conference (DAC) (05-12-2021)“…Emerging applications, like cloud services, are demanding more computational power, while also giving rise to various security and privacy challenges. Current…”
Get full text
Conference Proceeding -
15
SRASA: a Generalized Theoretical Framework for Security and Reliability Analysis in Computing Systems
Published in Journal of hardware and systems security (01-09-2019)“…Although there is a pressing need for highly secure and reliable computing systems, there is a glaring lack of formalism under which the properties of…”
Get full text
Journal Article -
16
Optimal and Heuristic Application-Aware Oblivious Routing
Published in IEEE transactions on computers (01-01-2013)“…Conventional oblivious routing algorithms do not take into account resource requirements (e.g., bandwidth, latency) of various flows in a given application. As…”
Get full text
Journal Article -
17
A Compiler for Transparent Namespace-Based Access Control for the Zeno Architecture
Published in 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED) (01-09-2022)“…With memory safety and security issues continuing to plague modern systems, security is rapidly becoming a first class priority in new architectures and…”
Get full text
Conference Proceeding -
18
Survey of Attacks and Defenses on Edge-Deployed Neural Networks
Published in 2019 IEEE High Performance Extreme Computing Conference (HPEC) (01-09-2019)“…Deep Neural Network (DNN) workloads are quickly moving from datacenters onto edge devices, for latency, privacy, or energy reasons. While datacenter networks…”
Get full text
Conference Proceeding -
19
A Post-Quantum Secure Discrete Gaussian Noise Sampler
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…While the notion of achieving "quantum supremacy" may be debatable, rapid developments in the field of quantum computing are heading towards more realistic…”
Get full text
Conference Proceeding -
20
Hardware Root-of-Trust Support for Operational Technology Cybersecurity in Critical Infrastructures
Published in 2023 IEEE High Performance Extreme Computing Conference (HPEC) (25-09-2023)“…Operational technology (OT) systems use hardware and software to monitor and control physical processes, devices, and infrastructure - often critical…”
Get full text
Conference Proceeding