Author of the publication

NIGHTs-WATCH: a cache-based side-channel intrusion detector using hardware performance counters.

, , , , , and . HASP@ISCA, page 1:1-1:8. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IBC-EI: An Instruction Based Compression method with Encryption and Integrity Checking., , , , , , and . ReCoSoC, page 138-145. Univ. Montpellier II, (2007)WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks., , , , , , and . IEEE Access, (2020)Asymmetric Cache Coherency: Policy Modifications to Improve Multicore Performance., , and . ACM Trans. Reconfigurable Technol. Syst., 5 (3): 12:1-12:12 (2012)Closed-loop-based self-adaptive Hardware/Software-Embedded systems: Design methodology and smart cam case study., , and . ACM Trans. Embed. Comput. Syst., 10 (3): 38:1-38:28 (2011)Protecting Behavioral IPs During Design Time: Key-Based Obfuscation Techniques for HLS in the Cloud., , , and . Behavioral Synthesis for Hardware Security, (2022)Design and Implementation of a Multi-Core Crypto-Processor for Software Defined Radios., , , , and . ARC, volume 6578 of Lecture Notes in Computer Science, page 29-40. Springer, (2011)Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware Protections., , , , , , , and . EuroS&P Workshops, page 304-310. IEEE, (2023)3DMIA: a multi-objective artificial immune algorithm for 3D-MPSoC multi-application 3D-NoC mapping., , , , , and . GECCO (Companion), page 167-168. ACM, (2013)Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm., , , , , and . GIIS, page 1-5. IEEE, (2018)IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Eviction., , and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 32-45. Springer, (2020)