A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Dynamic Hardware Monitors for Network Processor Protection.
IEEE Trans. Computers, 2016
Securing Network Processors with High-Performance Hardware Monitors.
IEEE Trans. Dependable Secur. Comput., 2015
Multi-task support for security-enabled embedded processors.
Proceedings of the 26th IEEE International Conference on Application-specific Systems, 2015
System-Level Security for Network Processors with Hardware Monitors.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014
High-performance implementation of in-network traffic pacing for small-buffer networks.
Comput. Commun., 2013
Scalable hardware monitors to protect network processors from data plane attacks.
Proceedings of the IEEE Conference on Communications and Network Security, 2013