Publications

Export (86) results:[Tagged][XML][BibTex]
Sort by:[Year][Title][Type][Author]
Filters: author is Ruby B. Lee  [Clear All Filters]
T
Zhang, T., Zhang, Y., Lee, R.B., "DoS Attacks on Your Memory in the Cloud", ACM Asia Conference on Computer and Communications Security, Abu Dhabi, April, 2017. Abstract Tagged XML BibTex
Zhang, T., Lee, R.B., "Host-based DoS Attacks and Defense in the Cloud", Workshop on Hardware Architectural Support for Security and Privacy, June, 2017. Abstract Tagged XML BibTex
Zhang, T., Xu, Y., Bao, Y., Lee, R.B., "CloudShelter: Protecting Virtual Machines’ Memory Resource Availability in Cloud Computing", IEEE International Conference on Computer Design (ICCD), Boston, IEEE, 05/11/2017. Tagged XML BibTex
Zhang, T., Zhang, Y., Lee, R.B., "CloudRadar: A Real-time Side-channel Attack Detection System in Clouds", Research in Attacks, Intrusion and Defense, September 2016. Abstract Tagged XML BibTex
Zhang, T., Lee, R.B., "Monitoring and Attestation of Virtual Machine Security Health in Cloud Computing", IEEE Micro Special Issues on Security, vol. 36, issue 5, Sept/Oct 2016. Abstract Tagged XML BibTex
Zhang, T., Lee, R.B., "CloudMonatt: an Architecture for Security Health Monitoring and Attestation of Virtual Machines in Cloud Computing", Proceedings of The 42nd International Symposium on Computer Architecture, Portland, pp. 362-274, June 2015. Tagged XML BibTex
Zhang, T., Lee, R.B., "New Models of Cache Architectures Characterizing Information Leakage from Cache Side", Proceedings of Annual Computer Security Applications Conference (ACSAC), December 2014, pp. 96-105, 2014  . Tagged XML BibTex
Zhang, T., Chen, S., Liu, F., Lee, R.B., "Side Channel Vulnerability Metrics: the Promise and the Pitfalls", in Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), June 24, 2013. Tagged XML BibTex
Zhang, T., Szefer, J., Lee, R.B., "Security Verification of Hardware-enabled Attestation Protocols", in Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), December 2012. Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and benefits of suboptimal utility maximization", IEEE/ACM Transactions on Networking, vol. 19, issue 4, 2011  . Abstract Tagged XML BibTex
Levin, T., Dwoskin, J., Bhaskara, G., Nguyen, T., Clark, P., Lee, R.B., Irvine, C., Benzel, T., "Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture", 2nd International Conference on Trusted Computing (TRUST 2009), Oxford, U.K., pp. 133-156, April 2009. Abstract Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., "Multi-path Key Establishment Against REM Attacks in Wireless Ad Hoc Networks", IEEE Global Communications Conference (GLOBECOM 2009), Honolulu, Hawaii, USA, Nov/Dec 2009. Abstract Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "How Bad is Suboptimal Rate Allocation?", Proceedings of the 27th. Conference on Computer Communications, IEEE (INFOCOM ’08), pp. 951-959, April 13-18 2008. Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and Benefits of Suboptimal Utility Maximization", submitted to IEEE Transactions on Networking, Nov. 4. Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., Multi-path Key Establishment under Byzantine Attacks in Wireless Ad Hoc Networks, , 2008  . Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., Reliable and Secure Distributed Storage of Critical Information, , 2008  . Tagged XML BibTex
R
Lee, R.B., "Using Moving Target Defense for Secure Hardware Design", Princeton University Department of Electrical Engineering Technical Report CE-L2016-002, 2016  . Tagged XML BibTex
Lee, R.B., "Improving Cyber Security", Advances in Cyber Security: Technology, Operations and Experiences: Fordham University Press, pp. 37-59, 2013  . Tagged XML BibTex
Lee, R.B., Chen, Y., "Processor Accelerator for AES", Proceedings of the 2010 IEEE 8th Symposium on Application Specific Processors, Anaheim, CA, USA, pp. 71-76, June 13-14 2010. Abstract Tagged XML BibTex
Elbaz, R., Champagne, D., Gebotys, C., Lee, R.B., Potlapally, N., Torres, L., "Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines", Transactions on Computational Science IV, Lecture Notes in Computer Science (LNCS), issue 5340, pp. 1-22, March 2009. Abstract Tagged XML BibTex
Lee, R.B., "Precision Architecture", IEEE computer, vol. 22, issue 1, pp. 14, 01/1989. Tagged XML BibTex
M
Gomathisankaran, M., Lee, R.B., "Maya: A Novel Block Encryption Function", International Workshop on Coding and Cryptography (WCC 2009), Ullensvang, Norway, May 2009. Tagged XML BibTex
Mahon, M., Lee, R.B., Miller, T., Huck, J., Bryg, W., "Hewlett-Packard Precision Architecture: the Processor", HP Journal, vol. 37, issue 8, pp. 19, 08/1986. Tagged XML BibTex
J
Szefer, J., Jamkhedkar, P., Perez-Botero, D., Lee, R.B., "Cyber Defenses for Physical Attacks and Insider Threats in Cloud", Proceedings of the ACM Symposium on Information, Computer and Communications Security (AsiaCCS), June 2014. Tagged XML BibTex
Szefer, J., Lee, R.B., "Hardware-Enhanced Security for Cloud", Secure Cloud Computing , Berlin, Springer, pp. 57-76, 2014  . Tagged XML BibTex