| 2009 |
| 5 | EE | Timothy E. Levin,
Jeffrey S. Dwoskin,
Ganesha Bhaskara,
Thuy D. Nguyen,
Paul C. Clark,
Ruby B. Lee,
Cynthia E. Irvine,
Terry Benzel:
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture.
TRUST 2009: 133-152 |
| 2008 |
| 4 | EE | Xiaoxin Chen,
Tal Garfinkel,
E. Christopher Lewis,
Pratap Subrahmanyam,
Carl A. Waldspurger,
Dan Boneh,
Jeffrey S. Dwoskin,
Dan R. K. Ports:
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems.
ASPLOS 2008: 2-13 |
| 2007 |
| 3 | EE | Jeffrey S. Dwoskin,
Ruby B. Lee:
Hardware-rooted trust for secure key management and transient trust.
ACM Conference on Computer and Communications Security 2007: 389-400 |
| 2 | EE | Jeffrey S. Dwoskin,
Dahai Xu,
Jianwei Huang,
Mung Chiang,
Ruby B. Lee:
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks.
GLOBECOM 2007: 166-171 |
| 2005 |
| 1 | EE | Ruby B. Lee,
Peter C. S. Kwan,
John Patrick McGregor,
Jeffrey S. Dwoskin,
Zhenghong Wang:
Architecture for Protecting Critical Secrets in Microprocessors.
ISCA 2005: 2-13 |