2009 |
61 | EE | Timothy E. Levin,
Jeffrey S. Dwoskin,
Ganesha Bhaskara,
Thuy D. Nguyen,
Paul C. Clark,
Ruby B. Lee,
Cynthia E. Irvine,
Terry Benzel:
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture.
TRUST 2009: 133-152 |
60 | EE | Reouven Elbaz,
David Champagne,
Catherine H. Gebotys,
Ruby B. Lee,
Nachiketh R. Potlapally,
Lionel Torres:
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines.
Transactions on Computational Science 4: 1-22 (2009) |
2008 |
59 | EE | Yedidya Hilewitz,
Cédric Lauradoux,
Ruby B. Lee:
Bit matrix multiplication in commodity processors.
ASAP 2008: 7-12 |
58 | EE | Yedidya Hilewitz,
Yiqun Lisa Yin,
Ruby B. Lee:
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation.
FSE 2008: 173-188 |
57 | EE | Tian Lan,
Xiaojun Lin,
Mung Chiang,
Ruby B. Lee:
How Bad is Suboptimal Rate Allocation?
INFOCOM 2008: 321-325 |
56 | EE | David Champagne,
Reouven Elbaz,
Ruby B. Lee:
The Reduced Address Space (RAS) for Application Memory Authentication.
ISC 2008: 47-63 |
55 | EE | Zhenghong Wang,
Ruby B. Lee:
A novel cache architecture with enhanced performance and security.
MICRO 2008: 83-93 |
54 | EE | Yedidya Hilewitz,
Ruby B. Lee:
Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors.
Signal Processing Systems 53(1-2): 145-169 (2008) |
2007 |
53 | EE | Jeffrey S. Dwoskin,
Ruby B. Lee:
Hardware-rooted trust for secure key management and transient trust.
ACM Conference on Computer and Communications Security 2007: 389-400 |
52 | EE | Reouven Elbaz,
David Champagne,
Ruby B. Lee,
Lionel Torres,
Gilles Sassatelli,
Pierre Guillemin:
TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks.
CHES 2007: 289-302 |
51 | EE | Jeffrey S. Dwoskin,
Dahai Xu,
Jianwei Huang,
Mung Chiang,
Ruby B. Lee:
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks.
GLOBECOM 2007: 166-171 |
50 | EE | Yedidya Hilewitz,
Ruby B. Lee:
Performing Advanced Bit Manipulations Efficiently in General-Purpose Processors.
IEEE Symposium on Computer Arithmetic 2007: 251-260 |
49 | EE | Zhenghong Wang,
Jing Deng,
Ruby B. Lee:
Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC.
INFOCOM 2007: 2531-2535 |
48 | EE | Zhenghong Wang,
Ruby B. Lee:
New cache designs for thwarting software cache-based side channel attacks.
ISCA 2007: 494-505 |
47 | EE | Nachiketh R. Potlapally,
Anand Raghunathan,
Srivaths Ravi,
Niraj K. Jha,
Ruby B. Lee:
Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based Analysis.
IEEE Trans. VLSI Syst. 15(4): 465-470 (2007) |
46 | EE | Nachiketh R. Potlapally,
Srivaths Ravi,
Anand Raghunathan,
Ruby B. Lee,
Niraj K. Jha:
Configuration and Extension of Embedded Processors to Optimize IPSec Protocol Execution.
IEEE Trans. VLSI Syst. 15(5): 605-609 (2007) |
2006 |
45 | EE | Zhenghong Wang,
Ruby B. Lee:
Covert and Side Channels Due to Processor Architecture.
ACSAC 2006: 473-482 |
44 | EE | Yedidya Hilewitz,
Ruby B. Lee:
Fast Bit Compression and Expansion with Parallel Extract and Parallel Deposit Instructions.
ASAP 2006: 65-72 |
43 | EE | Nachiketh R. Potlapally,
Anand Raghunathan,
Srivaths Ravi,
Niraj K. Jha,
Ruby B. Lee:
Satisfiability-based framework for enabling side-channel attacks on cryptographic software.
DATE Designers' Forum 2006: 18-23 |
42 | EE | Nachiketh R. Potlapally,
Srivaths Ravi,
Anand Raghunathan,
Ruby B. Lee,
Niraj K. Jha:
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors.
VLSI Design 2006: 299-304 |
2005 |
41 | EE | John Patrick McGregor,
Yiqun Lisa Yin,
Ruby B. Lee:
A Traitor Tracing Scheme Based on RSA for Fast Decryption.
ACNS 2005: 56-74 |
40 | EE | A. Murat Fiskiran,
Ruby B. Lee:
On-Chip Lookup Tables for Fast Symmetric-Key Encryption.
ASAP 2005: 356-363 |
39 | EE | Ruby B. Lee:
Processor Architecture for Trustworthy Computers.
Asia-Pacific Computer Systems Architecture Conference 2005: 1-2 |
38 | EE | Zhenghong Wang,
Ruby B. Lee:
Capacity Estimation of Non-Synchronous Covert Channels.
ICDCS Workshops 2005: 170-176 |
37 | EE | Zhenghong Wang,
Ruby B. Lee:
New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation.
ISC 2005: 498-505 |
36 | EE | Ruby B. Lee,
Peter C. S. Kwan,
John Patrick McGregor,
Jeffrey S. Dwoskin,
Zhenghong Wang:
Architecture for Protecting Critical Secrets in Microprocessors.
ISCA 2005: 2-13 |
35 | EE | A. Murat Fiskiran,
Ruby B. Lee:
Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography.
ITCC (1) 2005: 526-531 |
34 | EE | Ruby B. Lee,
Xiao Yang,
Zhijie Shi:
Single-Cycle Bit Permutations with MOMR Execution.
J. Comput. Sci. Technol. 20(5): 577-585 (2005) |
33 | EE | John Patrick McGregor,
Ruby B. Lee:
Protecting cryptographic keys and computations via virtual secure coprocessing.
SIGARCH Computer Architecture News 33(1): 16-26 (2005) |
32 | EE | Ruby B. Lee,
A. Murat Fiskiran:
PLX: An Instruction Set Architecture and Testbed for Multimedia Information Processing.
VLSI Signal Processing 40(1): 85-108 (2005) |
2004 |
31 | EE | A. Murat Fiskiran,
Ruby B. Lee:
Evaluating Instruction Set Extensions for Fast Arithmetic on Binary Finite Fields.
ASAP 2004: 125-136 |
30 | EE | Ruby B. Lee,
Xiao Yang,
Zhijie Shi:
Validating Word-Oriented Processors for Bit and Multi-word Operations.
Asia-Pacific Computer Systems Architecture Conference 2004: 473-488 |
29 | EE | Srivaths Ravi,
Paul C. Kocher,
Ruby B. Lee,
Gary McGraw,
Anand Raghunathan:
Security as a new dimension in embedded system design.
DAC 2004: 753-760 |
28 | EE | A. Murat Fiskiran,
Ruby B. Lee:
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution.
ICCD 2004: 452-457 |
27 | | Xiao Yang,
Ruby B. Lee:
PLX FP: an efficient floating-point instruction set for 3D graphics.
ICME 2004: 137-140 |
26 | | Stephen M. Specht,
Ruby B. Lee:
Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures.
ISCA PDCS 2004: 543-550 |
25 | EE | Ruby B. Lee,
Zhijie Shi,
Yiqun Lisa Yin,
Ronald L. Rivest,
Matthew J. B. Robshaw:
On Permutation Operations in Cipher Design.
ITCC (2) 2004: 569-577 |
2003 |
24 | EE | Ruby B. Lee:
Challenges in the Design of Security-Aware Processors.
ASAP 2003: 2- |
23 | EE | Zhijie Shi,
Xiao Yang,
Ruby B. Lee:
Arbitrary Bit Permutations in One or Two Cycles.
ASAP 2003: 237- |
22 | EE | Ruby B. Lee,
David K. Karig,
John Patrick McGregor,
Zhijie Shi:
Enlisting Hardware Architecture to Thwart Malicious Code Injection.
SPC 2003: 237-252 |
21 | EE | Charles R. Moore,
Kevin W. Rudd,
Ruby B. Lee,
Pradip Bose:
Guest Editors' Introduction: Micro's Top Picks from Microarchitecture Conferences.
IEEE Micro 23(6): 8-10 (2003) |
20 | EE | John Patrick McGregor,
Ruby B. Lee:
Architectural techniques for accelerating subword permutations with repetitions.
IEEE Trans. VLSI Syst. 11(3): 325-335 (2003) |
2002 |
19 | EE | Ruby B. Lee,
A. Murat Fiskiran,
Zhijie Shi,
Xiao Yang:
Refining Instruction Set Architecture for High-Performance Multimedia Processing in Constrained Environments.
ASAP 2002: 253-264 |
18 | EE | Zhijie Shi,
Ruby B. Lee:
Subword Sorting with Versatile Permutation Instructions.
ICCD 2002: 234-241 |
2001 |
17 | | John Patrick McGregor,
Ruby B. Lee:
Architectural Enhancements for Fast Subword Permutations with Repetitions in Cryptographic Applications.
ICCD 2001: 453-461 |
16 | | A. Murat Fiskiran,
Ruby B. Lee:
Performance Impact of Addressing Modes on Encryption Algorithms.
ICCD 2001: 542-545 |
15 | EE | Ruby B. Lee,
A. Murat Fiskiran,
Abdulla Bubsha:
Multimedia Instructions In IA-64.
ICME 2001 |
14 | EE | Ruby B. Lee:
Computer Arithmetic-A Processor Architect's Perspective.
IEEE Symposium on Computer Arithmetic 2001: 3- |
13 | EE | Ruby B. Lee,
Zhijie Shi,
Xiao Yang:
Cryptography Efficient Permutation Instructions for Fast Software.
IEEE Micro 21(6): 56-69 (2001) |
2000 |
12 | EE | Zhijie Shi,
Ruby B. Lee:
Bit Permutation Instructions for Accelerating Software Cryptography.
ASAP 2000: 138-148 |
11 | EE | Ruby B. Lee:
Subword Permutation Instructions for Two-Dimensional Multimedia Processing in MicroSIMD Architectures.
ASAP 2000: 3-14 |
10 | EE | Xiao Yang,
Ruby B. Lee:
Fast Subword Permutation Instructions Using Omega and Flip Network Stages.
ICCD 2000: 15-21 |
9 | EE | John Patrick McGregor,
Ruby B. Lee:
Performance Impact of Data Compression on Virtual Private Network Transactions.
LCN 2000: 500-510 |
8 | | Daniel F. Zucker,
Ruby B. Lee,
Michael J. Flynn:
Hardware and software cache prefetching techniques for MPEG benchmarks.
IEEE Trans. Circuits Syst. Video Techn. 10(5): 782-796 (2000) |
1997 |
7 | EE | Alice Yu,
Ruby B. Lee,
Michael J. Flynn:
Performance Enhancement of H.263 Encoder Based on Zero Coefficient Prediction.
ACM Multimedia 1997: 21-29 |
6 | | Thomas M. Conte,
Pradeep K. Dubey,
Matthew D. Jennings,
Ruby B. Lee,
Alex Peleg,
Salliah Rathnam,
Michael S. Schlansker,
Peter Song,
Andrew Wolfe:
Challenges to Combining General-Purpose and Multimedia Processors.
IEEE Computer 30(12): 33-37 (1997) |
1996 |
5 | | Ruby B. Lee,
Jerome C. Huck:
64-bit and Multimedia Extensions in the PA-RISC 2.0 Architecture.
COMPCON 1996: 152-160 |
4 | | Daniel F. Zucker,
Michael J. Flynn,
Ruby B. Lee:
Improving Performance for MPEG Players.
COMPCON 1996: 327-332 |
3 | | Daniel F. Zucker,
Michael J. Flynn,
Ruby B. Lee:
A Comparison of Hardware Prefetching Techniques for Mulimedia Benchmarks.
ICMCS 1996: 236-244 |
1995 |
2 | | Ruby B. Lee:
Realtime MPEG Video via Software Decompression oon a PA-RISC Processor.
COMPCON 1995: 186-192 |
1989 |
1 | | Ruby B. Lee:
Precision Architecture.
IEEE Computer 22(1): 78-91 (1989) |