Syed Kamran Haider
Syed Kamran Haider
Qualcomm
Verified email at uconn.edu - Homepage
Title
Cited by
Cited by
Year
Advancing the State-of-the-Art in Hardware Trojans Detection
SK Haider, C Jin, M Ahmad, D Shila, O Khan, M van Dijk
IEEE Transactions on Dependable and Secure Computing, 2017
49*2017
Proram: dynamic prefetcher for oblivious ram
X Yu, SK Haider, L Ren, C Fletcher, A Kwon, M van Dijk, S Devadas
Proceedings of the 42nd Annual International Symposium on Computer …, 2015
272015
Advancing the state-of-the-art in hardware trojans design
SK Haider, C Jin, M van Dijk
2017 IEEE 60th International Midwest Symposium on Circuits and Systems …, 2017
172017
Connecting the dots: Privacy leakage via write-access patterns to the main memory
TM John, SK Haider, H Omar, M Van Dijk
IEEE Transactions on Dependable and Secure Computing, 2017
122017
Lease/release: Architectural support for scaling contended data structures
SK Haider, W Hasenplaugh, D Alistarh
ACM SIGPLAN Notices 51 (8), 17, 2016
112016
Exploring the performance implications of memory safety primitives in many-core processors executing multi-threaded workloads
M Ahmad, SK Haider, F Hijaz, M van Dijk, O Khan
Proceedings of the Fourth Workshop on Hardware and Architectural Support for …, 2015
52015
Leveraging Hardware Isolation for Process Level Access Control & Authentication
SK Haider, H Omar, I Lebedev, S Devadas, M van Dijk
Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017
42017
Revisiting definitional foundations of oblivious ram for secure processor implementations
SK Haider, O Khan, M van Dijk
arXiv preprint arXiv:1706.03852, 2017
32017
The Transactional Conflict Problem
D Alistarh, SK Haider, R Kübler, G Nadiradze
arXiv preprint arXiv:1804.00947, 2018
22018
M-map: Multi-factor memory authentication for secure embedded processors
SK Haider, M Ahmad, F Hijaz, A Patni, E Johnson, M Seita, O Khan, ...
2015 33rd IEEE International Conference on Computer Design (ICCD), 471-474, 2015
22015
Breaking the Oblivious-RAM Bandwidth Wall
H Omar, SK Haider, L Ren, M van Dijk, O Khan
2018 IEEE 36th International Conference on Computer Design (ICCD), 115-122, 2018
12018
Comments on" Defeating HaTCh: Building Malicious IP Cores"
SK Haider, C Jin, M van Dijk
arXiv preprint arXiv:1804.04783, 2018
12018
Lease/Release: Architectural Support for Scaling Contended Data Structures
SK Haider, W Hasenplaugh, D Alistarh
ACM Transactions on Parallel Computing (TOPC) 4 (2), 8, 2017
12017
Architectural Primitives for Secure Computation Platforms
SK Haider
PhD thesis, University of Connecticut, 2017
12017
An efficient soft decision reed-solomon decoder for moderate throughput
S Scholl, SK Haider, N Wehn
2016 18th Mediterranean Electrotechnical Conference (MELECON), 1-6, 2016
12016
Virtual fingerprint-image-based authentication increases privacy for users of mouse-replacement interfaces
V Grindle, SK Haider, J Magee, M van Dijk
International Conference on Universal Access in Human-Computer Interaction …, 2015
12015
Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processors
SK Haider, M van Dijk
Cryptography 3 (1), 10, 2019
2019
Development of Tele-Surgical Robot
S Munir, S Tariq, SK Haider
NUST-SEECS, 2011
2011
Side Channel Analysis Power Side Channel
M van Dijk, SK Haider, C Jin, PH Nguyen
Advanced Power Side Channel Cache Side Channel Attacks DMA Attacks
M van Dijk, SK Haider, C Jin, PH Nguyen
The system can't perform the operation now. Try again later.
Articles 1–20