Publications

Export (207) results:[Tagged][XML][BibTex]
Sort by:[Year][Title][Type][Author]
T
Zhang, T., Lee, R.B., "Host-based DoS Attacks and Defense in the Cloud", Workshop on Hardware Architectural Support for Security and Privacy, June, 2017. Abstract Tagged XML BibTex
Zhang, T., "Detection and Mitigation of Security Threats in Cloud Computing", PhD Thesis, Electrical Engineering Department, Princeton, NJ, Princeton University, pp. 257, 2017  . Abstract Tagged XML BibTex
Zhang, T., Xu, Y., Bao, Y., Lee, R.B., "CloudShelter: Protecting Virtual Machines’ Memory Resource Availability in Cloud Computing", IEEE International Conference on Computer Design (ICCD), Boston, IEEE, 05/11/2017. Tagged XML BibTex
Zhang, T., Zhang, Y., Lee, R.B., "CloudRadar: A Real-time Side-channel Attack Detection System in Clouds", Research in Attacks, Intrusion and Defense, September 2016. Abstract Tagged XML BibTex
Zhang, T., Lee, R.B., "Monitoring and Attestation of Virtual Machine Security Health in Cloud Computing", IEEE Micro Special Issues on Security, vol. 36, issue 5, Sept/Oct 2016. Abstract Tagged XML BibTex
Zhang, T., Lee, R.B., "CloudMonatt: an Architecture for Security Health Monitoring and Attestation of Virtual Machines in Cloud Computing", Proceedings of The 42nd International Symposium on Computer Architecture, Portland, pp. 362-274, June 2015. Tagged XML BibTex
Zhang, T., Lee, R.B., "New Models of Cache Architectures Characterizing Information Leakage from Cache Side", Proceedings of Annual Computer Security Applications Conference (ACSAC), December 2014, pp. 96-105, 2014  . Tagged XML BibTex
Zhang, T., Chen, S., Liu, F., Lee, R.B., "Side Channel Vulnerability Metrics: the Promise and the Pitfalls", in Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), June 24, 2013. Tagged XML BibTex
Zhang, T., Szefer, J., Lee, R.B., "Security Verification of Hardware-enabled Attestation Protocols", in Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), December 2012. Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and benefits of suboptimal utility maximization", IEEE/ACM Transactions on Networking, vol. 19, issue 4, 2011  . Abstract Tagged XML BibTex
Levin, T., Dwoskin, J., Bhaskara, G., Nguyen, T., Clark, P., Lee, R.B., Irvine, C., Benzel, T., "Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture", 2nd International Conference on Trusted Computing (TRUST 2009), Oxford, U.K., pp. 133-156, April 2009. Abstract Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., "Multi-path Key Establishment Against REM Attacks in Wireless Ad Hoc Networks", IEEE Global Communications Conference (GLOBECOM 2009), Honolulu, Hawaii, USA, Nov/Dec 2009. Abstract Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "How Bad is Suboptimal Rate Allocation?", Proceedings of the 27th. Conference on Computer Communications, IEEE (INFOCOM ’08), pp. 951-959, April 13-18 2008. Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and Benefits of Suboptimal Utility Maximization", submitted to IEEE Transactions on Networking, Nov. 4. Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., Multi-path Key Establishment under Byzantine Attacks in Wireless Ad Hoc Networks, , 2008  . Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., Reliable and Secure Distributed Storage of Critical Information, , 2008  . Tagged XML BibTex
S
Specht, S., Lee, R.B., "Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures", Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems (PDCS 2004), International Workshop on Security in Parallel and Distributed Systems, San Francisco, California, USA, pp. 543-550, Sept. 2004. Tagged XML BibTex
Shi, Z.J., Lee, R.B., "Implementation Complexity of Bit Permutation Instructions", Proceedings of the 37th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, California, Pacific Grove, California, USA, pp. 879-886, Nov. 2003. Tagged XML BibTex
Shi, Z., Yang, X., Lee, R.B., "Arbitrary Bit Permutations in One or Two Cycles", Proceedings of the 14th IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP 2003), The Hague, The Netherlands, pp. 237-247, June 2003. Tagged XML BibTex
Shi, Z., Lee, R.B., "Subword Sorting with Versatile Permutation Instructions", Proceedings of the International Conference on Computer Design (ICCD 2002), Freiburg, Germany, pp. 234-241, Sept. 2002. Tagged XML BibTex
Shi, Z., Lee, R.B., "Bit Permutation Instructions for Accelerating Software Cryptography", Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP 2000), Boston, Massachusetts, USA, pp. 138-148, July 2000. Tagged XML BibTex
R
Lee, R.B., "Using Moving Target Defense for Secure Hardware Design", Princeton University Department of Electrical Engineering Technical Report CE-L2016-002, 2016  . Tagged XML BibTex
Lee, R.B., "Improving Cyber Security", Advances in Cyber Security: Technology, Operations and Experiences: Fordham University Press, pp. 37-59, 2013  . Tagged XML BibTex
Lee, R.B., Chen, Y., "Processor Accelerator for AES", Proceedings of the 2010 IEEE 8th Symposium on Application Specific Processors, Anaheim, CA, USA, pp. 71-76, June 13-14 2010. Abstract Tagged XML BibTex
Elbaz, R., Champagne, D., Gebotys, C., Lee, R.B., Potlapally, N., Torres, L., "Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines", Transactions on Computational Science IV, Lecture Notes in Computer Science (LNCS), issue 5340, pp. 1-22, March 2009. Abstract Tagged XML BibTex



Papers are copyright by their authors, publishers, and/or Princeton University. Please see publishes' sites or contact the authors for full copyright policies.