2009 |
5 | EE | Timothy E. Levin,
Jeffrey S. Dwoskin,
Ganesha Bhaskara,
Thuy D. Nguyen,
Paul C. Clark,
Ruby B. Lee,
Cynthia E. Irvine,
Terry Benzel:
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture.
TRUST 2009: 133-152 |
2008 |
4 | EE | Xiaoxin Chen,
Tal Garfinkel,
E. Christopher Lewis,
Pratap Subrahmanyam,
Carl A. Waldspurger,
Dan Boneh,
Jeffrey S. Dwoskin,
Dan R. K. Ports:
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems.
ASPLOS 2008: 2-13 |
2007 |
3 | EE | Jeffrey S. Dwoskin,
Ruby B. Lee:
Hardware-rooted trust for secure key management and transient trust.
ACM Conference on Computer and Communications Security 2007: 389-400 |
2 | EE | Jeffrey S. Dwoskin,
Dahai Xu,
Jianwei Huang,
Mung Chiang,
Ruby B. Lee:
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks.
GLOBECOM 2007: 166-171 |
2005 |
1 | EE | Ruby B. Lee,
Peter C. S. Kwan,
John Patrick McGregor,
Jeffrey S. Dwoskin,
Zhenghong Wang:
Architecture for Protecting Critical Secrets in Microprocessors.
ISCA 2005: 2-13 |