Xiaofei (Rex) Guo
Xiaofei (Rex) Guo
Confluera
confluera.com üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Security analysis of concurrent error detection against differential fault analysis
X Guo, D Mukhopadhyay, C Jin, R Karri
Journal of Cryptographic Engineering 5 (3), 153-169, 2015
742015
Recomputing with permuted operands: A concurrent error detection approach
X Guo, R Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2013
702013
Invariance-based concurrent error detection for advanced encryption standard
X Guo, R Karri
Proceedings of the 49th Annual Design Automation Conference, 573-578, 2012
422012
Provably Secure Concurrent Error Detection Against Differential Fault Analysis.
X Guo, D Mukhopadhyay, R Karri
IACR Cryptol. ePrint Arch. 2012, 552, 2012
232012
Fault Attacks on AES and Their Countermeasures
S Ali, X Guo, R Karri, D Mukhopadhyay
Secure System Design and Trustable Computing, 163-208, 2016
192016
NREPO: Normal basis recomputing with permuted operands
X Guo, D Mukhopadhyay, C Jin, R Karri
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
132014
Did we learn from LLC side channel attacks? a cache leakage detection tool for crypto libraries
G Irazoqui, K Cong, X Guo, H Khattri, A Kanuparthi, T Eisenbarth, B Sunar
arXiv preprint arXiv:1709.01552, 2017
122017
Cache side channel attack: Exploitability and countermeasures
G Irazoqui, X Guo
Black Hat Asia 2017 (3), 1-72, 2017
112017
COUNTERMEASURES AGAINST SIDE-CHANNEL ATTACKS ON CRYPTOGRAPHIC ALGORITHMS
X Guo, X Guo, BB Brumley
US Patent 20,150,222,421, 2015
72015
Low-Cost Concurrent Error Detection for GCM and CCM
X Guo, R Karri
Journal of Electronic Testing 30 (6), 725-737, 2014
62014
Numchecker: A system approach for kernel rootkit detection and identification
X Wang, X Guo
Black Hat Asia, 2016
42016
Exploiting small leakages in masks to turn a second-order attack into a first-order attack
A DeTrano, S Guilley, X Guo, N Karimi, R Karri
Proceedings of the Fourth Workshop on Hardware and Architectural Support for …, 2015
42015
Simulation and analysis of negative-bias temperature instability aging on power analysis attacks
X Guo, N Karimi, F Regazzoni, C Jin, R Karri
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
42015
NETWORK INTRUSION COUNTER-INTELLIGENCE
N Yadav, SC Chang, S Gandham, X Guo, HV Nguyen, X Liu, TT Ngo, ...
US Patent 20,190,207,976, 2019
32019
Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets
A DeTrano, N Karimi, R Karri, X Guo, C Carlet, S Guilley
The Scientific World Journal 2015, 2015
22015
Can algorithm diversity in stream cipher implementation thwart (natural and) malicious faults?
X Guo, C Jin, C Zhang, A Papadimitriou, D Hély, R Karri
IEEE Transactions on Emerging Topics in Computing 4 (3), 363-373, 2015
22015
CSAW 2009 team report (Polytechnic Institute of NYU). CSAW Embedded System Challenge
R Guo, S Kannan, W Liu, X Wang
22011
Provably secure concurrent error detection for advanced encryption standard
X Guo, D Mukhopadhyay, R Karri
ePrint Archive, 552, 0
2
Fault attacks and countermeasures on symmetric key cryptographic algorithms
X Guo
POLYTECHNIC INSTITUTE OF NEW YORK UNIVERSITY, 2014
12014
Non-overlapping transition encoding for global on-chip interconnect
X Guo, S Lin, W Refai, GS Rose
2009 IEEE International SOC Conference (SOCC), 255-258, 2009
12009
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20