SurfNoC: A low latency and provably non-interfering approach to secure networks-on-chip HMG Wassel, Y Gao, JK Oberg, T Huffmire, R Kastner, FT Chong, ... ACM SIGARCH Computer Architecture News 41 (3), 583-594, 2013 | 153 | 2013 |
Moats and drawbridges: An isolation primitive for reconfigurable hardware based systems T Huffmire, B Brotherton, G Wang, T Sherwood, R Kastner, T Levin, ... 2007 IEEE Symposium on Security and Privacy (SP'07), 281-295, 2007 | 147 | 2007 |
Internet presentation system S Nelson, CH Li, TD Huffmire US Patent 6,725,219, 2004 | 118 | 2004 |
Internet presentation system S Nelson, CH Li, TD Huffmire US Patent 6,725,219, 2004 | 118 | 2004 |
Internet presentation system S Nelson, CH Li, TD Huffmire US Patent 6,725,219, 2004 | 118 | 2004 |
Handbook of FPGA design security T Huffmire, C Irvine, TD Nguyen, T Levin, R Kastner, T Sherwood Springer Science & Business Media, 2010 | 85 | 2010 |
A 3-D split manufacturing approach to trustworthy system development J Valamehr, T Sherwood, R Kastner, D Marangoni-Simonsen, T Huffmire, ... IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2013 | 77 | 2013 |
Managing security in FPGA-based embedded systems T Huffmire, B Brotherton, T Sherwood, R Kastner, T Levin, TD Nguyen, ... IEEE Design & Test of Computers 25 (6), 590-598, 2008 | 70 | 2008 |
Wavelet-based phase classification T Huffmire, T Sherwood Proceedings of the 15th international conference on Parallel architectures …, 2006 | 56 | 2006 |
Security checkers: Detecting processor malicious inclusions at runtime M Bilzor, T Huffmire, C Irvine, T Levin 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 34-39, 2011 | 44 | 2011 |
Designing secure systems on reconfigurable hardware T Huffmire, B Brotherton, N Callegari, J Valamehr, J White, R Kastner, ... ACM Transactions on Design Automation of Electronic Systems (TODAES) 13 (3 …, 2008 | 44 | 2008 |
Networks on chip with provable security properties HMG Wassel, Y Gao, JK Oberg, T Huffmire, R Kastner, FT Chong, ... IEEE Micro 34 (3), 57-68, 2014 | 43 | 2014 |
Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage M Bilzor, T Huffmire, C Irvine, T Levin 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 49-54, 2012 | 42 | 2012 |
Wavelet-based video indexing and querying X Wen, TD Huffmire, HH Hu, A Finkelstein Multimedia systems 7, 350-358, 1999 | 42 | 1999 |
Policy-driven memory protection for reconfigurable hardware T Huffmire, S Prasad, T Sherwood, R Kastner Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006 | 34 | 2006 |
A qualitative security analysis of a new class of 3-D integrated crypto co-processors J Valamehr, T Huffmire, C Irvine, R Kastner, ÇK Koç, T Levin, T Sherwood Cryptography and Security: From Theory to Applications: Essays Dedicated to …, 2012 | 31 | 2012 |
Hardware assistance for trustworthy systems through 3-D integration J Valamehr, M Tiwari, T Sherwood, R Kastner, T Huffmire, C Irvine, ... Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 29 | 2010 |
Enforcing memory policy specifications in reconfigurable hardware T Huffmire, T Sherwood, R Kastner, T Levin computers & security 27 (5-6), 197-215, 2008 | 28 | 2008 |
Security primitives for reconfigurable hardware-based systems T Huffmire, T Levin, T Nguyen, C Irvine, B Brotherton, G Wang, ... ACM Transactions on Reconfigurable Technology and Systems (TRETS) 3 (2), 1-35, 2010 | 23 | 2010 |
Threats and challenges in reconfigurable hardware security R Kastner, T Huffmire CALIFORNIA UNIV SAN DIEGO LA JOLLA DEPT OF COMPUTER SCIENCE AND ENGINEERING, 2008 | 23 | 2008 |