关注
Xiaofei (Rex) Guo
Xiaofei (Rex) Guo
Culminate Inc.
在 culminatesecurity.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Security analysis of concurrent error detection against differential fault analysis
X Guo, D Mukhopadhyay, C Jin, R Karri
Journal of Cryptographic Engineering 5, 153-169, 2015
912015
Recomputing with permuted operands: A concurrent error detection approach
X Guo, R Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2013
802013
Fault attacks on AES and their countermeasures
S Ali, X Guo, R Karri, D Mukhopadhyay
Secure System Design and Trustable Computing, 163-208, 2016
452016
Invariance-based concurrent error detection for advanced encryption standard
X Guo, R Karri
Proceedings of the 49th Annual Design Automation Conference, 573-578, 2012
422012
NETWORK INTRUSION COUNTER-INTELLIGENCE
N Yadav, SC Chang, S Gandham, X Guo, HV Nguyen, X Liu, TT Ngo, ...
US Patent 20,190,207,976, 2019
282019
Provably secure concurrent error detection against differential fault analysis
X Guo, D Mukhopadhyay, R Karri
Cryptology EPrint Archive, 2012
212012
COUNTERMEASURES AGAINST SIDE-CHANNEL ATTACKS ON CRYPTOGRAPHIC ALGORITHMS
X Guo, X Guo, BB Brumley
US Patent 20,150,222,421, 2015
182015
Did we learn from LLC side channel attacks? A cache leakage detection tool for crypto libraries
G Irazoqui, K Cong, X Guo, H Khattri, A Kanuparthi, T Eisenbarth, B Sunar
arXiv preprint arXiv:1709.01552, 2017
172017
Cache side channel attack: Exploitability and countermeasures
G Irazoqui, X Guo
Black Hat Asia 2017 (3), 1-72, 2017
142017
NREPO: Normal basis recomputing with permuted operands
X Guo, D Mukhopadhyay, C Jin, R Karri
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
122014
Exploiting Small Leakages in Masks to Turn a Second‐Order Attack into a First‐Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets
A DeTrano, N Karimi, R Karri, X Guo, C Carlet, S Guilley
The Scientific World Journal 2015 (1), 743618, 2015
82015
Did we learn from LLC side channel attacks
G Irazoqui, K Cong, X Guo, H Khattri, AK Kanuparthi, T Eisenbarth, ...
A Cache Leakage Detection Tool for Crypto Libraries. arXiv abs/1709.01552, 2017
72017
Low-cost concurrent error detection for GCM and CCM
X Guo, R Karri
Journal of Electronic Testing 30, 725-737, 2014
62014
Numchecker: A system approach for kernel rootkit detection and identification
X Wang, X Guo
Black Hat Asia, 2016
52016
Simulation and analysis of negative-bias temperature instability aging on power analysis attacks
X Guo, N Karimi, F Regazzoni, C Jin, R Karri
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
52015
Exploiting small leakages in masks to turn a second-order attack into a first-order attack
A DeTrano, S Guilley, X Guo, N Karimi, R Karri
Proceedings of the Fourth Workshop on Hardware and Architectural Support for …, 2015
42015
Can algorithm diversity in stream cipher implementation thwart (natural and) malicious faults?
X Guo, C Jin, C Zhang, A Papadimitriou, D Hély, R Karri
IEEE Transactions on Emerging Topics in Computing 4 (3), 363-373, 2015
32015
Network intrusion counter-intelligence
N Yadav, SC Chang, S Gandham, X Guo, HV Nguyen, X Liu, TT Ngo, ...
US Patent 11,750,653, 2023
22023
CSAW 2009 team report (Polytechnic Institute of NYU). CSAW Embedded System Challenge
R Guo, S Kannan, W Liu, X Wang
CSAW Embedded System Challenge, 2011
22011
Provably secure concurrent error detection foradvanced encryption standard
X Guo
ePrint Archive, 552, 0
2
系统目前无法执行此操作,请稍后再试。
文章 1–20