Search Results - "Suh, G. E."
-
1
Extracting secret keys from integrated circuits
Published in IEEE transactions on very large scale integration (VLSI) systems (01-10-2005)“…Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However,…”
Get full text
Journal Article -
2
Dynamic Partitioning of Shared Cache Memory
Published in The Journal of supercomputing (01-04-2004)Get full text
Journal Article -
3
Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions
Published in ACM SIGARCH Computer Architecture News (2005)“…Secure processors enable new applications by ensuring private and authentic program execution even in the face of physical attack. In this paper we present the…”
Get full text
Journal Article -
4
Caches and hash trees for efficient memory integrity verification
Published in The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings (2003)“…We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could…”
Get full text
Conference Proceeding -
5
A new memory monitoring scheme for memory-aware scheduling and partitioning
Published in Proceedings Eighth International Symposium on High Performance Computer Architecture (2002)“…We propose a low overhead, online memory monitoring scheme utilizing a set of novel hardware counters. The counters indicate the marginal gain in cache hits as…”
Get full text
Conference Proceeding -
6
High-performance parallel accelerator for flexible and efficient run-time monitoring
Published in IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012) (01-06-2012)“…This paper proposes Harmoni, a high performance hardware accelerator architecture that can support a broad range of run-time monitoring and bookkeeping…”
Get full text
Conference Proceeding -
7
Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints
Published in 2012 IEEE Symposium on Security and Privacy (01-05-2012)“…We demonstrate that unmodified commercial Flash memory can provide two important security functions: true random number generation and digital fingerprinting…”
Get full text
Conference Proceeding -
8
Optimal and Heuristic Application-Aware Oblivious Routing
Published in IEEE transactions on computers (01-01-2013)“…Conventional oblivious routing algorithms do not take into account resource requirements (e.g., bandwidth, latency) of various flows in a given application. As…”
Get full text
Journal Article -
9
Flexible and Efficient Instruction-Grained Run-Time Monitoring Using On-Chip Reconfigurable Fabric
Published in 2010 43rd Annual IEEE/ACM International Symposium on Microarchitecture (01-12-2010)“…This paper proposes Flex Core, a hybrid processor architecture where an on-chip reconfigurable fabric (FPGA) is tightly coupled with the main processing core…”
Get full text
Conference Proceeding -
10
Efficient memory integrity verification and encryption for secure processors
Published in Proceedings. 36th Annual IEEE/ACM International Symposium on Microarchitecture, 2003. MICRO-36 (2003)“…Secure processors enable new sets of applications such as commercial grid computing, software copy-protection, and secure mobile agents by providing security…”
Get full text
Conference Proceeding -
11
Fast development of hardware-based run-time monitors through architecture framework and high-level synthesis
Published in 2012 IEEE 30th International Conference on Computer Design (ICCD) (01-09-2012)“…Recent work has shown that hardware-based runtime monitoring techniques can significantly enhance security and reliability of computing systems with minimal…”
Get full text
Conference Proceeding -
12
Efficient Timing Channel Protection for On-Chip Networks
Published in 2012 IEEE/ACM Sixth International Symposium on Networks-on-Chip (01-05-2012)“…On-chip network is often dynamically shared among applications that are concurrently running on a chip-multiprocessor (CMP). In general, such shared resources…”
Get full text
Conference Proceeding -
13
Hiding Information in Flash Memory
Published in 2013 IEEE Symposium on Security and Privacy (01-05-2013)“…This paper introduces a novel information hiding technique for Flash memory. The method hides data within an analog characteristic of Flash, the program time…”
Get full text
Conference Proceeding -
14
Precise exception support for decoupled run-time monitoring architectures
Published in 2011 IEEE 29th International Conference on Computer Design (ICCD) (01-10-2011)“…Recently, researchers have proposed decoupled monitoring architectures that utilize parallel hardware such as multi-cores or accelerators to enable…”
Get full text
Conference Proceeding -
15
Speeding up Exponentiation using an Untrusted Computational Resource
Published in Designs, codes, and cryptography (01-05-2006)Get full text
Journal Article -
16
Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions
Published in 32nd International Symposium on Computer Architecture (ISCA'05) (01-05-2005)“…Secure processors enable new applications by ensuring private and authentic program execution even in the face of physical attack. In this paper we present the…”
Get full text
Conference Proceeding -
17
A non-volatile microcontroller with integrated floating-gate transistors
Published in 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W) (01-06-2011)“…We present a non-volatile processor architecture where its entire state can be almost instantly stored and restored in a non-volatile fashion. This capability…”
Get full text
Conference Proceeding -
18
On the performance of averaged optimal routing
Published in 2012 46th Annual Conference on Information Sciences and Systems (CISS) (01-03-2012)“…Traffic uncertainty makes designing optimal routing protocols for many networks a difficult problem. A good way to capture uncertainty is via an uncertainty…”
Get full text
Conference Proceeding -
19
FlexCache: Field Extensible Cache Controller Architecture Using On-chip Reconfigurable Fabric
Published in 2011 21st International Conference on Field Programmable Logic and Applications (01-09-2011)“…In today's microprocessors, the cache architecture is highly optimized for one particular design and cannot be changed after fabrication. While allowing…”
Get full text
Conference Proceeding -
20
Analysis of application-aware on-chip routing under traffic uncertainty
Published in Proceedings of the Fifth ACM/IEEE International Symposium (01-05-2011)“…Application-aware routing exploits static knowledge of an application's traffic pattern to improve performance compared to generalpurpose routing algorithms…”
Get full text
Conference Proceeding