Andrew Ferraiuolo

According to our database1, Andrew Ferraiuolo authored at least 13 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Policy Transparency: Authorization Logic Meets General Transparency to Prove Software Supply Chain Integrity.
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022

2018
Secure Autonomous Cyber-Physical Systems Through Verifiable Information Flow Control.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018

HyperFlow: A Processor Architecture for Nonmalleable, Timing-Safe Information Flow Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Komodo: Using verification to disentangle secure-enclave hardware from software.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

Secure Information Flow Verification with Mutable Dependent Types.
Proceedings of the 54th Annual Design Automation Conference, 2017

Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis.
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, 2017

2016
Lattice priority scheduling: Low-overhead timing-channel protection for a shared memory controller.
Proceedings of the 2016 IEEE International Symposium on High Performance Computer Architecture, 2016

SecDCP: secure dynamic cache partitioning for efficient timing channel protection.
Proceedings of the 53rd Annual Design Automation Conference, 2016

2015
Detecting Hardware Trojans using On-chip Sensors in an ASIC Design.
J. Electron. Test., 2015

2014
Timing channel protection for a shared memory controller.
Proceedings of the 20th IEEE International Symposium on High Performance Computer Architecture, 2014

Low-overhead and high coverage run-time race detection through selective meta-data management.
Proceedings of the 20th IEEE International Symposium on High Performance Computer Architecture, 2014

2013
Detection of trojans using a combined ring oscillator network and off-chip transient power analysis.
ACM J. Emerg. Technol. Comput. Syst., 2013

2012
Experimental analysis of a ring oscillator network for hardware Trojan detection in a 90nm ASIC.
Proceedings of the 2012 IEEE/ACM International Conference on Computer-Aided Design, 2012


  Loading...