Efficient mitigation of side-channel based attacks against speculative execution processing architectures R Branco, K Hu, K Sun, H Kawakami US Patent 11,119,784, 2021 | 27 | 2021 |
Security and system architecture: Comparison of Android customizations R Gallo, P Hongo, R Dahab, LC Navarro, H Kawakami, K Galvão, ... Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015 | 25 | 2015 |
You cannot always win the race: Analyzing the lfence/jmp mitigation for branch target injection A Milburn, K Sun, H Kawakami arXiv preprint arXiv:2203.04277, 2022 | 14 | 2022 |
T-DRE: a hardware trusted computing base for direct recording electronic vote machines R Gallo, H Kawakami, R Dahab, R Azevedo, S Lima, G Araujo Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 13 | 2010 |
On device identity establishment and verification R Gallo, H Kawakami, R Dahab European Public Key Infrastructure Workshop, 130-145, 2009 | 8 | 2009 |
Case study: on the security of key storage on PCs R Gallo, H Kawakami, R Dahab 2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013 | 6 | 2013 |
Hardware security evaluation using assurance case models H Kawakami, R Gallo, R Dahab, E Nascimento 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 5 | 2015 |
FORTUNA-A probabilistic framework for early design stages of hardware-based secure systems R Gallo, H Kawakami, R Dahab 2011 5th International Conference on Network and System Security, 184-191, 2011 | 5 | 2011 |
SCuP-Secure Cryptographic Microprocessor R Gallo, H Kawakami, R Dahab Anais do XI Simpósio Brasileiro em Segurança da Informação e de Sistemas …, 2011 | 4 | 2011 |
FORTUNA—A framework for the design and development of hardware-based secure systems R Gallo, H Kawakami, R Dahab Journal of Systems and Software 86 (8), 2063-2076, 2013 | 3 | 2013 |
A hardware trusted computing base for direct recording electronic vote machines R Gallo, H Kawakami, R Dahab, R Azevedo, S Lima, G Araujo Austin, Texas, USA, 2010 | 3 | 2010 |
You Cannot Always Win the Race: Analyzing mitigations for branch target prediction attacks A Milburn, K Sun, H Kawakami 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 671-686, 2023 | 2 | 2023 |
The Power of Telemetry: Uncovering Software-Based Side-Channel Attacks on Apple M1/M2 Systems N Chawla, C Liu, A Chakraborty, I Chervatyuk, K Sun, TM Hamasaki, ... arXiv preprint arXiv:2306.16391, 2023 | 2 | 2023 |
Hardware security module equipment with native implementation of a cryptographic key management communication protocol and remote confidence enhancement method for … AB JÚNIOR, CPL Gouvea, FKA Yamamoto, GF Mandaji, AT Sasaki, ... US Patent App. 16/639,963, 2020 | 2 | 2020 |
A mathematical modeling of exploitations and mitigation techniques using set theory R Branco, K Hu, H Kawakami, K Sun 2018 IEEE Security and Privacy Workshops (SPW), 323-328, 2018 | 2 | 2018 |
ACBuilder: A tool for hardware architecture security evaluation H Kawakami, D Ott, HC Wong, R Dahab, R Gallo 2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016 | 1 | 2016 |
Uncovering Software-Based Power Side-Channel Attacks on Apple M1/M2 Systems N Chawla, C Liu, A Chakraborty, I Chervatyuk, T Moreira Hamasaki, ... Proceedings of the 61st ACM/IEEE Design Automation Conference, 1-6, 2024 | | 2024 |
Efficient mitigation of side-channel based attacks against speculative execution processing architectures R Branco, K Hu, K Sun, H Kawakami US Patent 11,544,070, 2023 | | 2023 |
Per thread side channel attack protection K Sun, K Hu, HDM Kawakami, R Branco US Patent 11,314,861, 2022 | | 2022 |
A framework for hardware security evaluation= Um framework para a avaliação de segurança de hardware H de Medeiros Kawakami [sn], 2015 | | 2015 |