Zobrazeno 1 - 10
of 634
pro vyhledávání: '"Lee, Ruby"'
Autor:
Hu, Guangyuan, Lee, Ruby B.
Caches have been exploited to leak secret information due to the different times they take to handle memory accesses. Cache timing attacks include non-speculative cache side and covert channel attacks and cache-based speculative execution attacks. We
Externí odkaz:
http://arxiv.org/abs/2309.16172
Autor:
Hu, Guangyuan, Lee, Ruby B.
Hardware caches are essential performance optimization features in modern processors to reduce the effective memory access time. Unfortunately, they are also the prime targets for attacks on computer processors because they are high-bandwidth and rel
Externí odkaz:
http://arxiv.org/abs/2302.00732
Publikováno v:
2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021, pp. 108-120
Speculative execution attacks leverage the speculative and out-of-order execution features in modern computer processors to access secret data or execute code that should not be executed. Secret information can then be leaked through a covert channel
Externí odkaz:
http://arxiv.org/abs/2301.03724
Autor:
He, Zecheng, Lee, Ruby B.
In cloud computing, it is desirable if suspicious activities can be detected by automatic anomaly detection systems. Although anomaly detection has been investigated in the past, it remains unsolved in cloud computing. Challenges are: characterizing
Externí odkaz:
http://arxiv.org/abs/2108.08977
Impostors are attackers who take over a smartphone and gain access to the legitimate user's confidential and private information. This paper proposes a defense-in-depth mechanism to detect impostors quickly with simple Deep Learning algorithms, which
Externí odkaz:
http://arxiv.org/abs/2103.06453
Autor:
He, Zecheng, Sunkara, Srinivas, Zang, Xiaoxue, Xu, Ying, Liu, Lijuan, Wichers, Nevan, Schubiner, Gabriel, Lee, Ruby, Chen, Jindong, Arcas, Blaise Agüera y
As mobile devices are becoming ubiquitous, regularly interacting with a variety of user interfaces (UIs) is a common aspect of daily life for many people. To improve the accessibility of these devices and to enable their usage in a variety of setting
Externí odkaz:
http://arxiv.org/abs/2012.12350
Spectre and Meltdown attacks and their variants exploit hardware performance optimization features to cause security breaches. Secret information is accessed and leaked through covert or side channels. New attack variants keep appearing and we do not
Externí odkaz:
http://arxiv.org/abs/2009.07998
In this paper, we show that sensor-based impostor detection with deep learning can achieve excellent impostor detection accuracy at lower hardware cost compared to past work on sensor-based user authentication (the inverse problem) which used more co
Externí odkaz:
http://arxiv.org/abs/2002.03914
Autor:
Cerin, Ester, Zhang, Casper J.P., Barnett, David W., Lee, Ruby S.Y., Sit, Cindy H.P., Barnett, Anthony
Publikováno v:
In Cities October 2023 141