Author of the publication

Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing.

, , , , , , , and . Cybersecur., 1 (1): 2 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

System-level design methodology enabling fast development of baseband MP-SoC for 4G small cell base station., , and . DATE, page 1-6. European Design and Automation Association, (2014)An accurate ACOSSO metamodeling technique for processor architecture design space exploration., , , and . ASP-DAC, page 689-694. IEEE, (2015)Analysis of DRAM Vulnerability Using Computation Tree Logic., , , , , and . ICC, page 986-991. IEEE, (2022)Elastic Resource Allocation Based on Dynamic Perception of Operator Influence Domain in Distributed Stream Processing., , , , , , and . ICCS (1), volume 13350 of Lecture Notes in Computer Science, page 734-748. Springer, (2022)Polar Codes with Local-Global Decoding., , and . IEEECONF, page 392-396. IEEE, (2022)Differential Testing of x86 Instruction Decoders with Instruction Operand Inferring Algorithm., , , , and . ICCD, page 196-203. IEEE, (2021)In-depth Testing of x86 Instruction Disassemblers with Feedback Controlled DFS Algorithm., , , and . ICCD, page 463-470. IEEE, (2022)SCPORAM: a hardware support scheme for protecting memory access patterns., , , , and . TrustCom, page 983-990. IEEE, (2020)Which2learn: A Vulnerability Dataset Complexity Measurement Method for Data-Driven Detectors., , and . ISCC, page 970-976. IEEE, (2023)A 100 GOPS ASP based baseband processor for wireless communication., , , , , and . DATE, page 121-124. EDA Consortium San Jose, CA, USA / ACM DL, (2013)