Kekai Hu
Kekai Hu
Principal Security Researcher, Intel
intel.com üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
System-level security for network processors with hardware monitors
K Hu, T Wolf, T Teixeira, R Tessier
2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2014
162014
Scalable hardware monitors to protect network processors from data plane attacks
K Hu, H Chandrikakutty, R Tessier, T Wolf
2013 IEEE Conference on Communications and Network Security (CNS), 314-322, 2013
132013
Multi-task support for security-enabled embedded processors
T Thomas, A Pouraghily, K Hu, R Tessier, T Wolf
2015 IEEE 26th International Conference on Application-specific Systems …, 2015
82015
Efficient mitigation of side-channel based attacks against speculative execution processing architectures
R Branco, K Hu, K Sun, H Kawakami
US Patent App. 16/023,564, 2019
72019
Securing network processors with high-performance hardware monitors
T Wolf, HK Chandrikakutty, K Hu, D Unnikrishnan, R Tessier
IEEE Transactions on Dependable and Secure Computing 12 (6), 652-664, 2014
62014
Securing Network Processors with High-Performance Hardware Monitors
T Wolf, H Chandrikakutty, K Hu, D Unnikrishnan, R Tessier
Dependable and Secure Computing, IEEE Transactions on, 2014
62014
Dynamic hardware monitors for network processor protection
K Hu, HK Chandrikakutty, Z Goodman, R Tessier, T Wolf
IEEE Transactions on Computers 65 (3), 860-872, 2015
52015
一种基于改进型谱减法的语音增强新算法
胡科开, 吴凭天, 杨磊, 陈波
大众科技, 25-26, 2008
52008
A new memory type against speculative side channel attacks
K Sun, R Branco, K Hu
Intel—STrategic Offensive Research & Mitigations (STORM), 2019
42019
Fine grained control flow enforcement to mitigate malicious call/jump oriented programming
K Hu, K Sun, R Branco
US Patent 10,719,319, 2020
32020
Reconfigurable network router security
R Tessier, T Wolf, K Hu, H Chandrikakutty
Reconfigurable logic: architecture, tools, and applications, 2018
32018
Mitigation of return-oriented programming exploits
K Sun, R Branco, K Hu
US Patent App. 16/453,716, 2019
22019
A mathematical modeling of exploitations and mitigation techniques using set theory
R Branco, K Hu, H Kawakami, K Sun
2018 IEEE Security and Privacy Workshops (SPW), 323-328, 2018
22018
Methods and apparatus for implementing a secure database using programmable integrated circuits with dynamic partial reconfigurability
K Hu, A Das
US Patent App. 16/221,298, 2019
12019
Use-after-free exploit prevention architecture
RR Branco, K Hu, K Sun
US Patent App. 15/843,878, 2019
12019
High-performance implementation of in-network traffic pacing for small-buffer networks
YS Hanay, A Dwaraki, K Hu, T Wolf
Computer communications 36 (13), 1450-1459, 2013
12013
Fine grained control flow enforcement to mitigate malicious call/jump oriented programming
K Hu, K Sun, R Branco
US Patent App. 16/946,545, 2020
2020
Per thread side channel attack protection
K Sun, K Hu, HDM Kawakami, R Branco
US Patent App. 16/584,373, 2020
2020
Techniques for preventing memory corruption
K Hu, K Sun, R Branco
US Patent App. 15/858,170, 2019
2019
Securing network processors with hardware monitors
K Hu
University of Massachusetts Amherst, 2015
2015
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20