Chester Rebeiro
Orcid: 0000-0001-8063-0026
According to our database1,
Chester Rebeiro
authored at least 79 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
<tt>FortiFix</tt> : A Fault Attack Aware Compiler Framework for Crypto Implementations.
ACM Trans. Design Autom. Electr. Syst., 2024
High Speed High Assurance implementations of Multivariate Quadratic based Signatures.
IACR Cryptol. ePrint Arch., 2024
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
Kryptonite: Worst-Case Program Interference Estimation on Multi-Core Embedded Systems.
ACM Trans. Embed. Comput. Syst., October, 2023
IEEE Trans. Computers, June, 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
A Survey of Security Concerns and Countermeasures in Modern Micro-architectures with Transient Execution.
CoRR, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
2022
IEEE Trans. Computers, 2022
CoRR, 2022
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022
Timed speculative attacks exploiting store-to-load forwarding bypassing cache-based countermeasures.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022
2021
ACM Trans. Design Autom. Electr. Syst., 2021
J. Cryptol., 2021
LEASH: Enhancing Micro-architectural Attack Detection with a Reactive Process Scheduler.
CoRR, 2021
2020
ACM Trans. Embed. Comput. Syst., 2020
FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
ProBLeSS: A Proactive Blockchain Based Spectrum Sharing Protocol Against SSDF Attacks in Cognitive Radio IoBT Networks.
IEEE Netw. Lett., 2020
SIGNED: A Challenge-Response Based Interrogation Scheme for Simultaneous Watermarking and Trojan Detection.
CoRR, 2020
SISSLE in consensus-based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use.
CoRR, 2020
Brutus: Refuting the Security Claims of the Cache Timing Randomization Countermeasure Proposed in CEASER.
IEEE Comput. Archit. Lett., 2020
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020
SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
2019
J. Hardw. Syst. Secur., 2019
IPA: an Instruction Profiling-Based Micro-architectural Side-Channel Attack on Block Ciphers.
J. Hardw. Syst. Secur., 2019
IEEE Embed. Syst. Lett., 2019
D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019
Proceedings of the 32nd IEEE International System-on-Chip Conference, 2019
Proceedings of the 20th ACM SIGPLAN/SIGBED International Conference on Languages, 2019
Towards Measuring Quality of Service in Untrusted Multi-Vendor Service Function Chains: Balancing Security and Resource Consumption.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Karna: A Gate-Sizing based Security Aware EDA Flow for Improved Power Side-Channel Attack Protection.
Proceedings of the International Conference on Computer-Aided Design, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the Security and Fault Tolerance in Internet of Things, 2019
2018
ACM Trans. Design Autom. Electr. Syst., 2018
IEEE Embed. Syst. Lett., 2018
ApproxBC: Blockchain Design Alternatives for Approximation-Tolerant Resource-Constrained Applications.
IEEE Commun. Stand. Mag., 2018
2017
IACR Cryptol. ePrint Arch., 2017
CoRR, 2017
Proceedings of the Hardware and Architectural Support for Security and Privacy, 2017
Proceedings of the 54th Annual Design Automation Conference, 2017
2016
IET Inf. Secur., 2016
Proceedings of the International Symposium on Integrated Circuits, 2016
A Formal Security Analysis of Even-Odd Sequential Prefetching in Profiled Cache-Timing Attacks.
Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, 2016
2015
Micro-Architectural Analysis of Time-Driven Cache Attacks: Quest for the Ideal Implementation.
IEEE Trans. Computers, 2015
2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2013
Theoretical Modeling of Elliptic Curve Scalar Multiplier on LUT-Based FPGAs for Area and Speed.
IEEE Trans. Very Large Scale Integr. Syst., 2013
IEEE Trans. Inf. Forensics Secur., 2013
Proceedings of the 8th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2013
Proceedings of the 2013 Euromicro Conference on Digital System Design, 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
Integr., 2012
Proceedings of the 45th Annual IEEE/ACM International Symposium on Microarchitecture, 2012
Proceedings of the 15th Euromicro Conference on Digital System Design, 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2011
IEEE Trans. Very Large Scale Integr. Syst., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Security Aspects in Information Technology, 2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the 21st ACM Great Lakes Symposium on VLSI 2010, 2011
Theoretical modeling of the Itoh-Tsujii Inversion algorithm for enhanced performance on k-LUT based FPGAs.
Proceedings of the Design, Automation and Test in Europe, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
2010
Proceedings of the VLSI Design 2010: 23rd International Conference on VLSI Design, 2010
2009
2008
Proceedings of the 21st International Conference on VLSI Design (VLSI Design 2008), 2008
Proceedings of the Progress in Cryptology, 2008
Proceedings of the Cellular Automata, 2008
2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006
2005
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005