Jason M Fung
Jason M Fung
Offensive Security Research Manager, Intel Corporation
Geverifieerd e-mailadres voor intel.com - Homepage
Geciteerd door
Geciteerd door
An in-depth analysis of the impact of processor affinity on network performance
A Foong, J Fung, D Newell
Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004 …, 2004
Component authentication for computer systems
HW Wong, WY Kwong, JM Fung
US Patent App. 11/486,617, 2008
Reducing branch misprediction penalties via dynamic control independence detection
Y Chou, J Fung, JP Shen
Proceedings of the 13th international conference on Supercomputing, 109-118, 1999
Architectural characterization of processor affinity in network processing
A Foong, J Fung, D Newell, S Abraham, P Irelan, A Lopez-Estrada
IEEE International Symposium on Performance Analysis of Systems and Software …, 2005
Verifying information flow properties of firmware using symbolic execution
P Subramanyan, S Malik, H Khattri, A Maiti, J Fung
2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), 337-342, 2016
Hardfails: Insights into software-exploitable hardware bugs
G Dessouky, D Gens, P Haney, G Persyn, A Kanuparthi, H Khattri, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 213-230, 2019
Formal security verification of concurrent firmware in SoCs using instruction-level abstraction for hardware
BY Huang, S Ray, A Gupta, JM Fung, S Malik
Proceedings of the 55th Annual Design Automation Conference, 1-6, 2018
Wireless Hotspot Attack Detection
MM Mirashrafi, JM Fung, J Satapathy, SB Godse, M Yelamanchi, ...
US Patent 9,705,913, 2017
Improved Linux SMP Scaling: User-directed Processor Affinity
A Foong, J Fung, D Newell
Intel Software Network Articles, 2011
Device, System, and Method for Processor-based Data Protection
G Prakash, JM Fung, C Rhodes, S Aissi
US Patent 9,569,633, 2017
When a patch is not enough-hardfails: Software-exploitable hardware bugs
G Dessouky, D Gens, P Haney, G Persyn, A Kanuparthi, H Khattri, ...
arXiv preprint arXiv:1812.00197, 2018
Formal Verification of Security Critical Hardware-Firmware Interactions in Commercial SoCs
S Ray, N Ghosh, RJ Masti, A Kanuparthi, JM Fung
2019 56th ACM/IEEE Design Automation Conference (DAC), 1-4, 2019
Towards Hardware-Based IP Vulnerability Detection and Post-Deployment Patching in Systems-on-Chip
B Tan, R Elnaggar, JM Fung, R Karri, K Chakrabarty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020
Hardware based technique to prevent critical fine-grained cache side-channel attacks
A Basak, A Kanuparthi, NN Kodalapura, JM Fung
US Patent App. 16/024,072, 2019
Guest Editors Introduction: Security of Beyond CMOS Devices: Issues and Opportunities
S Bhunia, A Chen, O Sinanoglu, JM Fung
IEEE Transactions on Emerging Topics in Computing 5 (3), 302-303, 2017
Security Validation in Modern Systems-on-Chip
JM Fung, S Malik, P Subramanyan
Design Automation Conference (DAC) 2017, 2017
Reducing Branch Misprediction Penalty Via Dynamic Control Independence Detection
JML Fung, JP Shen
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–17