Volgen
Xiaofei (Rex) Guo
Xiaofei (Rex) Guo
Culminate Inc.
Geverifieerd e-mailadres voor culminatesecurity.com - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Security analysis of concurrent error detection against differential fault analysis
X Guo, D Mukhopadhyay, C Jin, R Karri
Journal of Cryptographic Engineering 5, 153-169, 2015
872015
Recomputing with permuted operands: A concurrent error detection approach
X Guo, R Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2013
782013
Fault Attacks on AES and Their Countermeasures
S Ali, X Guo, R Karri, D Mukhopadhyay
Secure System Design and Trustable Computing, 163-208, 2016
442016
Invariance-based concurrent error detection for advanced encryption standard
X Guo, R Karri
Proceedings of the 49th Annual Design Automation Conference, 573-578, 2012
432012
NETWORK INTRUSION COUNTER-INTELLIGENCE
N Yadav, SC Chang, S Gandham, X Guo, HV Nguyen, X Liu, TT Ngo, ...
US Patent 20,190,207,976, 2019
232019
Provably secure concurrent error detection against differential fault analysis
X Guo, D Mukhopadhyay, R Karri
Cryptology EPrint Archive, 2012
192012
Did we learn from LLC side channel attacks? a cache leakage detection tool for crypto libraries
G Irazoqui, K Cong, X Guo, H Khattri, A Kanuparthi, T Eisenbarth, B Sunar
arXiv preprint arXiv:1709.01552, 2017
172017
COUNTERMEASURES AGAINST SIDE-CHANNEL ATTACKS ON CRYPTOGRAPHIC ALGORITHMS
X Guo, X Guo, BB Brumley
US Patent 20,150,222,421, 2015
162015
Cache side channel attack: Exploitability and countermeasures
G Irazoqui, X Guo
Black Hat Asia 2017 (3), 1-72, 2017
142017
NREPO: Normal basis recomputing with permuted operands
X Guo, D Mukhopadhyay, C Jin, R Karri
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
122014
Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets
A DeTrano, N Karimi, R Karri, X Guo, C Carlet, S Guilley
The Scientific World Journal 2015, 2015
82015
Did we learn from LLC side channel attacks
G Irazoqui, K Cong, X Guo, H Khattri, AK Kanuparthi, T Eisenbarth, ...
A Cache Leakage Detection Tool for Crypto Libraries. arXiv abs/1709.01552, 2017
72017
Low-cost concurrent error detection for GCM and CCM
X Guo, R Karri
Journal of Electronic Testing 30, 725-737, 2014
62014
Numchecker: A system approach for kernel rootkit detection and identification
X Wang, X Guo
Black Hat Asia, 2016
52016
Exploiting small leakages in masks to turn a second-order attack into a first-order attack
A DeTrano, S Guilley, X Guo, N Karimi, R Karri
Proceedings of the Fourth Workshop on Hardware and Architectural Support for …, 2015
42015
Simulation and analysis of negative-bias temperature instability aging on power analysis attacks
X Guo, N Karimi, F Regazzoni, C Jin, R Karri
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
42015
NETWORK INTRUSION COUNTER-INTELLIGENCE
N Yadav, S Chang, S Gandham, X Guo, HV Nguyen, X Liu, TT Ngo, ...
US Patent App. 17/556,673, 2022
22022
Can algorithm diversity in stream cipher implementation thwart (natural and) malicious faults?
X Guo, C Jin, C Zhang, A Papadimitriou, D Hély, R Karri
IEEE Transactions on Emerging Topics in Computing 4 (3), 363-373, 2015
22015
CSAW 2009 team report (Polytechnic Institute of NYU). CSAW Embedded System Challenge
R Guo, S Kannan, W Liu, X Wang
CSAW Embedded System Challenge, 2011
22011
Provably secure concurrent error detection for, advanced encryption standard
X Guo
ePrint Archive, 552, 0
2
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20