Efficient mitigation of side-channel based attacks against speculative execution processing architectures R Branco, K Hu, K Sun, H Kawakami US Patent 11,119,784, 2021 | 26 | 2021 |
System-level security for network processors with hardware monitors K Hu, T Wolf, T Teixeira, R Tessier Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014 | 18 | 2014 |
Scalable hardware monitors to protect network processors from data plane attacks K Hu, H Chandrikakutty, R Tessier, T Wolf 2013 IEEE Conference on Communications and Network Security (CNS), 314-322, 2013 | 14 | 2013 |
Multi-task support for security-enabled embedded processors T Thomas, A Pouraghily, K Hu, R Tessier, T Wolf 2015 IEEE 26th International Conference on Application-specific Systems …, 2015 | 9 | 2015 |
A new memory type against speculative side channel attacks K Sun, R Branco, K Hu Intel—STrategic Offensive Research & Mitigations (STORM), 2019 | 8 | 2019 |
Securing Network Processors with High-Performance Hardware Monitors T Wolf, H Chandrikakutty, K Hu, D Unnikrishnan, R Tessier Dependable and Secure Computing, IEEE Transactions on, 2014 | 8 | 2014 |
Dynamic hardware monitors for network processor protection K Hu, HK Chandrikakutty, Z Goodman, R Tessier, T Wolf IEEE Transactions on Computers 65 (3), 860-872, 2015 | 7 | 2015 |
Mitigation of return-oriented programming exploits K Sun, R Branco, K Hu US Patent 11,256,807, 2022 | 6 | 2022 |
一种基于改进型谱减法的语音增强新算法 胡科开, 吴凭天, 杨磊, 陈波 大众科技 10 (9), 25-26, 2008 | 5 | 2008 |
Reconfigurable network router security R Tessier, T Wolf, K Hu, H Chandrikakutty, PE Gaillardon Reconfigurable logic: architecture, tools, and applications, 2018 | 3 | 2018 |
A mathematical modeling of exploitations and mitigation techniques using set theory R Branco, K Hu, H Kawakami, K Sun 2018 IEEE Security and Privacy Workshops (SPW), 323-328, 2018 | 2 | 2018 |
High-performance implementation of in-network traffic pacing for small-buffer networks YS Hanay, A Dwaraki, K Hu, T Wolf Computer communications 36 (13), 1450-1459, 2013 | 2 | 2013 |
Fine grained control flow enforcement to mitigate malicious call/jump oriented programming K Hu, K Sun, R Branco US Patent 11,327,755, 2022 | 1 | 2022 |
Efficient mitigation of side-channel based attacks against speculative execution processing architectures R Branco, K Hu, K Sun, H Kawakami US Patent 11,544,070, 2023 | | 2023 |
Methods and apparatus for implementing a secure database using programmable integrated circuits with dynamic partial reconfigurability K Hu, A Das US Patent 11,475,145, 2022 | | 2022 |
Context-based memory indirect branch target prediction K Sun, R Branco, K Hu, J Brandt US Patent App. 17/128,814, 2022 | | 2022 |
Context-based loop branch prediction K Sun, R Branco, K Hu US Patent App. 17/128,816, 2022 | | 2022 |
Per thread side channel attack protection K Sun, K Hu, HDM Kawakami, R Branco US Patent 11,314,861, 2022 | | 2022 |
Use-after-free exploit prevention architecture RR Branco, K Hu, K Sun US Patent 11,074,200, 2021 | | 2021 |
Fine grained control flow enforcement to mitigate malicious call/jump oriented programming K Hu, K Sun, R Branco US Patent 10,719,319, 2020 | | 2020 |