An in-depth analysis of the impact of processor affinity on network performance A Foong, J Fung, D Newell Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004 …, 2004 | 101 | 2004 |
{HardFails}: Insights into {Software-Exploitable} Hardware Bugs G Dessouky, D Gens, P Haney, G Persyn, A Kanuparthi, H Khattri, ... 28th USENIX Security Symposium (USENIX Security 19), 213-230, 2019 | 98 | 2019 |
Component authentication for computer systems HW Wong, WY Kwong, JM Fung US Patent App. 11/486,617, 2008 | 77 | 2008 |
Reducing branch misprediction penalties via dynamic control independence detection Y Chou, J Fung, JP Shen Proceedings of the 13th international conference on Supercomputing, 109-118, 1999 | 64 | 1999 |
Verifying information flow properties of firmware using symbolic execution P Subramanyan, S Malik, H Khattri, A Maiti, J Fung 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), 337-342, 2016 | 57 | 2016 |
Architectural characterization of processor affinity in network processing A Foong, J Fung, D Newell, S Abraham, P Irelan, A Lopez-Estrada IEEE International Symposium on Performance Analysis of Systems and Software …, 2005 | 54 | 2005 |
Formal security verification of concurrent firmware in SoCs using instruction-level abstraction for hardware BY Huang, S Ray, A Gupta, JM Fung, S Malik Proceedings of the 55th Annual Design Automation Conference, 1-6, 2018 | 34 | 2018 |
Wireless Hotspot Attack Detection MM Mirashrafi, JM Fung, J Satapathy, SB Godse, M Yelamanchi, ... US Patent 9,705,913, 2017 | 23 | 2017 |
An exhaustive approach to detecting transient execution side channels in RTL designs of processors MR Fadiheh, A Wezel, J Müller, J Bormann, S Ray, JM Fung, S Mitra, ... IEEE Transactions on Computers 72 (1), 222-235, 2022 | 19 | 2022 |
Toward hardware-based IP vulnerability detection and post-deployment patching in systems-on-chip B Tan, R Elnaggar, JM Fung, R Karri, K Chakrabarty IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020 | 17 | 2020 |
Formal verification of security critical hardware-firmware interactions in commercial SoCs S Ray, N Ghosh, RJ Masti, A Kanuparthi, JM Fung Proceedings of the 56th Annual Design Automation Conference 2019, 1-4, 2019 | 14 | 2019 |
Hardware based technique to prevent critical fine-grained cache side-channel attacks A Basak, A Kanuparthi, NN Kodalapura, JM Fung US Patent 11,144,468, 2021 | 12 | 2021 |
Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design B Ahmad, WK Liu, L Collini, H Pearce, JM Fung, J Valamehr, M Bidmeshki, ... Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided …, 2022 | 10 | 2022 |
Two sides of the same coin: Boons and banes of machine learning in hardware security W Liu, CH Chang, X Wang, C Liu, JM Fung, M Ebrahimabadi, N Karimi, ... IEEE Journal on Emerging and Selected Topics in Circuits and Systems 11 (2 …, 2021 | 10 | 2021 |
Improved Linux SMP Scaling: User-directed Processor Affinity A Foong, J Fung, D Newell Intel Software Network Articles, 2011 | 7 | 2011 |
Hardware-supported patching of security bugs in hardware IP blocks WK Liu, B Tan, JM Fung, R Karri, K Chakrabarty IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2022 | 6 | 2022 |
Methodology of assessing information leakage through software-accessible telemetries C Liu, M Kar, X Wang, N Chawla, N Roggel, B Yuce, JM Fung 2021 IEEE International Symposium on Hardware Oriented Security and Trust …, 2021 | 5 | 2021 |
When a patch is not enough-hardfails: Software-exploitable hardware bugs G Dessouky, D Gens, P Haney, G Persyn, A Kanuparthi, H Khattri, ... arXiv preprint arXiv:1812.00197, 2018 | 5 | 2018 |
Automating hardware security property generation R Kastner, F Restuccia, A Meza, S Ray, J Fung, C Sturton Proceedings of the 59th ACM/IEEE Design Automation Conference, 1384-1387, 2022 | 4 | 2022 |
Device, System, and Method for Processor-based Data Protection G Prakash, JM Fung, C Rhodes, S Aissi US Patent 9,569,633, 2017 | 4 | 2017 |