Zobrazeno 1 - 10
of 579
pro vyhledávání: '"Ruby, B."'
Autor:
Hu, Guangyuan, Lee, Ruby B.
Caches have been exploited to leak secret information due to the different times they take to handle memory accesses. Cache timing attacks include non-speculative cache side and covert channel attacks and cache-based speculative execution attacks. We
Externí odkaz:
http://arxiv.org/abs/2309.16172
Autor:
Hu, Guangyuan, Lee, Ruby B.
Hardware caches are essential performance optimization features in modern processors to reduce the effective memory access time. Unfortunately, they are also the prime targets for attacks on computer processors because they are high-bandwidth and rel
Externí odkaz:
http://arxiv.org/abs/2302.00732
Autor:
He, Zecheng, Lee, Ruby B.
In cloud computing, it is desirable if suspicious activities can be detected by automatic anomaly detection systems. Although anomaly detection has been investigated in the past, it remains unsolved in cloud computing. Challenges are: characterizing
Externí odkaz:
http://arxiv.org/abs/2108.08977
Impostors are attackers who take over a smartphone and gain access to the legitimate user's confidential and private information. This paper proposes a defense-in-depth mechanism to detect impostors quickly with simple Deep Learning algorithms, which
Externí odkaz:
http://arxiv.org/abs/2103.06453
Deep learning has become popular, and numerous cloud-based services are provided to help customers develop and deploy deep learning applications. Meanwhile, various attack techniques have also been discovered to stealthily compromise the model's inte
Externí odkaz:
http://arxiv.org/abs/1808.03277
We present a new and practical framework for security verification of secure architectures. Specifically, we break the verification task into external verification and internal verification. External verification considers the external protocols, i.e
Externí odkaz:
http://arxiv.org/abs/1807.01854
As machine learning becomes a practice and commodity, numerous cloud-based services and frameworks are provided to help customers develop and deploy machine learning applications. While it is prevalent to outsource model training and serving tasks in
Externí odkaz:
http://arxiv.org/abs/1807.01860
Autor:
Lee, Wei-Han, Lee, Ruby B.
Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker.
Externí odkaz:
http://arxiv.org/abs/1708.09754
We propose Secure Pick Up (SPU), a convenient, lightweight, in-device, non-intrusive and automatic-learning system for smartphone user authentication. Operating in the background, our system implicitly observes users' phone pick-up movements, the way
Externí odkaz:
http://arxiv.org/abs/1708.09366