2009 | ||
---|---|---|
61 | EE | Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhaskara, Thuy D. Nguyen, Paul C. Clark, Ruby B. Lee, Cynthia E. Irvine, Terry Benzel: Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture. TRUST 2009: 133-152 |
60 | EE | Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres: Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. Transactions on Computational Science 4: 1-22 (2009) |
2008 | ||
59 | EE | Yedidya Hilewitz, Cédric Lauradoux, Ruby B. Lee: Bit matrix multiplication in commodity processors. ASAP 2008: 7-12 |
58 | EE | Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee: Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. FSE 2008: 173-188 |
57 | EE | Tian Lan, Xiaojun Lin, Mung Chiang, Ruby B. Lee: How Bad is Suboptimal Rate Allocation? INFOCOM 2008: 321-325 |
56 | EE | David Champagne, Reouven Elbaz, Ruby B. Lee: The Reduced Address Space (RAS) for Application Memory Authentication. ISC 2008: 47-63 |
55 | EE | Zhenghong Wang, Ruby B. Lee: A novel cache architecture with enhanced performance and security. MICRO 2008: 83-93 |
54 | EE | Yedidya Hilewitz, Ruby B. Lee: Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors. Signal Processing Systems 53(1-2): 145-169 (2008) |
2007 | ||
53 | EE | Jeffrey S. Dwoskin, Ruby B. Lee: Hardware-rooted trust for secure key management and transient trust. ACM Conference on Computer and Communications Security 2007: 389-400 |
52 | EE | Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin: TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. CHES 2007: 289-302 |
51 | EE | Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung Chiang, Ruby B. Lee: Secure Key Management Architecture Against Sensor-Node Fabrication Attacks. GLOBECOM 2007: 166-171 |
50 | EE | Yedidya Hilewitz, Ruby B. Lee: Performing Advanced Bit Manipulations Efficiently in General-Purpose Processors. IEEE Symposium on Computer Arithmetic 2007: 251-260 |
49 | EE | Zhenghong Wang, Jing Deng, Ruby B. Lee: Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC. INFOCOM 2007: 2531-2535 |
48 | EE | Zhenghong Wang, Ruby B. Lee: New cache designs for thwarting software cache-based side channel attacks. ISCA 2007: 494-505 |
47 | EE | Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi, Niraj K. Jha, Ruby B. Lee: Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based Analysis. IEEE Trans. VLSI Syst. 15(4): 465-470 (2007) |
46 | EE | Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, Ruby B. Lee, Niraj K. Jha: Configuration and Extension of Embedded Processors to Optimize IPSec Protocol Execution. IEEE Trans. VLSI Syst. 15(5): 605-609 (2007) |
2006 | ||
45 | EE | Zhenghong Wang, Ruby B. Lee: Covert and Side Channels Due to Processor Architecture. ACSAC 2006: 473-482 |
44 | EE | Yedidya Hilewitz, Ruby B. Lee: Fast Bit Compression and Expansion with Parallel Extract and Parallel Deposit Instructions. ASAP 2006: 65-72 |
43 | EE | Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi, Niraj K. Jha, Ruby B. Lee: Satisfiability-based framework for enabling side-channel attacks on cryptographic software. DATE Designers' Forum 2006: 18-23 |
42 | EE | Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, Ruby B. Lee, Niraj K. Jha: Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors. VLSI Design 2006: 299-304 |
2005 | ||
41 | EE | John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee: A Traitor Tracing Scheme Based on RSA for Fast Decryption. ACNS 2005: 56-74 |
40 | EE | A. Murat Fiskiran, Ruby B. Lee: On-Chip Lookup Tables for Fast Symmetric-Key Encryption. ASAP 2005: 356-363 |
39 | EE | Ruby B. Lee: Processor Architecture for Trustworthy Computers. Asia-Pacific Computer Systems Architecture Conference 2005: 1-2 |
38 | EE | Zhenghong Wang, Ruby B. Lee: Capacity Estimation of Non-Synchronous Covert Channels. ICDCS Workshops 2005: 170-176 |
37 | EE | Zhenghong Wang, Ruby B. Lee: New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation. ISC 2005: 498-505 |
36 | EE | Ruby B. Lee, Peter C. S. Kwan, John Patrick McGregor, Jeffrey S. Dwoskin, Zhenghong Wang: Architecture for Protecting Critical Secrets in Microprocessors. ISCA 2005: 2-13 |
35 | EE | A. Murat Fiskiran, Ruby B. Lee: Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography. ITCC (1) 2005: 526-531 |
34 | EE | Ruby B. Lee, Xiao Yang, Zhijie Shi: Single-Cycle Bit Permutations with MOMR Execution. J. Comput. Sci. Technol. 20(5): 577-585 (2005) |
33 | EE | John Patrick McGregor, Ruby B. Lee: Protecting cryptographic keys and computations via virtual secure coprocessing. SIGARCH Computer Architecture News 33(1): 16-26 (2005) |
32 | EE | Ruby B. Lee, A. Murat Fiskiran: PLX: An Instruction Set Architecture and Testbed for Multimedia Information Processing. VLSI Signal Processing 40(1): 85-108 (2005) |
2004 | ||
31 | EE | A. Murat Fiskiran, Ruby B. Lee: Evaluating Instruction Set Extensions for Fast Arithmetic on Binary Finite Fields. ASAP 2004: 125-136 |
30 | EE | Ruby B. Lee, Xiao Yang, Zhijie Shi: Validating Word-Oriented Processors for Bit and Multi-word Operations. Asia-Pacific Computer Systems Architecture Conference 2004: 473-488 |
29 | EE | Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary McGraw, Anand Raghunathan: Security as a new dimension in embedded system design. DAC 2004: 753-760 |
28 | EE | A. Murat Fiskiran, Ruby B. Lee: Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution. ICCD 2004: 452-457 |
27 | Xiao Yang, Ruby B. Lee: PLX FP: an efficient floating-point instruction set for 3D graphics. ICME 2004: 137-140 | |
26 | Stephen M. Specht, Ruby B. Lee: Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures. ISCA PDCS 2004: 543-550 | |
25 | EE | Ruby B. Lee, Zhijie Shi, Yiqun Lisa Yin, Ronald L. Rivest, Matthew J. B. Robshaw: On Permutation Operations in Cipher Design. ITCC (2) 2004: 569-577 |
2003 | ||
24 | EE | Ruby B. Lee: Challenges in the Design of Security-Aware Processors. ASAP 2003: 2- |
23 | EE | Zhijie Shi, Xiao Yang, Ruby B. Lee: Arbitrary Bit Permutations in One or Two Cycles. ASAP 2003: 237- |
22 | EE | Ruby B. Lee, David K. Karig, John Patrick McGregor, Zhijie Shi: Enlisting Hardware Architecture to Thwart Malicious Code Injection. SPC 2003: 237-252 |
21 | EE | Charles R. Moore, Kevin W. Rudd, Ruby B. Lee, Pradip Bose: Guest Editors' Introduction: Micro's Top Picks from Microarchitecture Conferences. IEEE Micro 23(6): 8-10 (2003) |
20 | EE | John Patrick McGregor, Ruby B. Lee: Architectural techniques for accelerating subword permutations with repetitions. IEEE Trans. VLSI Syst. 11(3): 325-335 (2003) |
2002 | ||
19 | EE | Ruby B. Lee, A. Murat Fiskiran, Zhijie Shi, Xiao Yang: Refining Instruction Set Architecture for High-Performance Multimedia Processing in Constrained Environments. ASAP 2002: 253-264 |
18 | EE | Zhijie Shi, Ruby B. Lee: Subword Sorting with Versatile Permutation Instructions. ICCD 2002: 234-241 |
2001 | ||
17 | John Patrick McGregor, Ruby B. Lee: Architectural Enhancements for Fast Subword Permutations with Repetitions in Cryptographic Applications. ICCD 2001: 453-461 | |
16 | A. Murat Fiskiran, Ruby B. Lee: Performance Impact of Addressing Modes on Encryption Algorithms. ICCD 2001: 542-545 | |
15 | EE | Ruby B. Lee, A. Murat Fiskiran, Abdulla Bubsha: Multimedia Instructions In IA-64. ICME 2001 |
14 | EE | Ruby B. Lee: Computer Arithmetic-A Processor Architect's Perspective. IEEE Symposium on Computer Arithmetic 2001: 3- |
13 | EE | Ruby B. Lee, Zhijie Shi, Xiao Yang: Cryptography Efficient Permutation Instructions for Fast Software. IEEE Micro 21(6): 56-69 (2001) |
2000 | ||
12 | EE | Zhijie Shi, Ruby B. Lee: Bit Permutation Instructions for Accelerating Software Cryptography. ASAP 2000: 138-148 |
11 | EE | Ruby B. Lee: Subword Permutation Instructions for Two-Dimensional Multimedia Processing in MicroSIMD Architectures. ASAP 2000: 3-14 |
10 | EE | Xiao Yang, Ruby B. Lee: Fast Subword Permutation Instructions Using Omega and Flip Network Stages. ICCD 2000: 15-21 |
9 | EE | John Patrick McGregor, Ruby B. Lee: Performance Impact of Data Compression on Virtual Private Network Transactions. LCN 2000: 500-510 |
8 | Daniel F. Zucker, Ruby B. Lee, Michael J. Flynn: Hardware and software cache prefetching techniques for MPEG benchmarks. IEEE Trans. Circuits Syst. Video Techn. 10(5): 782-796 (2000) | |
1997 | ||
7 | EE | Alice Yu, Ruby B. Lee, Michael J. Flynn: Performance Enhancement of H.263 Encoder Based on Zero Coefficient Prediction. ACM Multimedia 1997: 21-29 |
6 | Thomas M. Conte, Pradeep K. Dubey, Matthew D. Jennings, Ruby B. Lee, Alex Peleg, Salliah Rathnam, Michael S. Schlansker, Peter Song, Andrew Wolfe: Challenges to Combining General-Purpose and Multimedia Processors. IEEE Computer 30(12): 33-37 (1997) | |
1996 | ||
5 | Ruby B. Lee, Jerome C. Huck: 64-bit and Multimedia Extensions in the PA-RISC 2.0 Architecture. COMPCON 1996: 152-160 | |
4 | Daniel F. Zucker, Michael J. Flynn, Ruby B. Lee: Improving Performance for MPEG Players. COMPCON 1996: 327-332 | |
3 | Daniel F. Zucker, Michael J. Flynn, Ruby B. Lee: A Comparison of Hardware Prefetching Techniques for Mulimedia Benchmarks. ICMCS 1996: 236-244 | |
1995 | ||
2 | Ruby B. Lee: Realtime MPEG Video via Software Decompression oon a PA-RISC Processor. COMPCON 1995: 186-192 | |
1989 | ||
1 | Ruby B. Lee: Precision Architecture. IEEE Computer 22(1): 78-91 (1989) |