Seguir
Henrique Kawakami
Henrique Kawakami
Email confirmado em intel.com
Título
Citado por
Citado por
Ano
Security and system architecture: Comparison of Android customizations
R Gallo, P Hongo, R Dahab, LC Navarro, H Kawakami, K Galvão, ...
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
222015
Efficient mitigation of side-channel based attacks against speculative execution processing architectures
R Branco, K Hu, K Sun, H Kawakami
US Patent 11,119,784, 2021
152021
T-DRE: a hardware trusted computing base for direct recording electronic vote machines
R Gallo, H Kawakami, R Dahab, R Azevedo, S Lima, G Araujo
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
122010
On device identity establishment and verification
R Gallo, H Kawakami, R Dahab
Public Key Infrastructures, Services and Applications: 6th European Workshop …, 2010
92010
Case study: on the security of key storage on PCs
R Gallo, H Kawakami, R Dahab
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
62013
Hardware security evaluation using assurance case models
H Kawakami, R Gallo, R Dahab, E Nascimento
2015 10th International Conference on Availability, Reliability and Security …, 2015
52015
FORTUNA-A probabilistic framework for early design stages of hardware-based secure systems
R Gallo, H Kawakami, R Dahab
2011 5th International Conference on Network and System Security, 184-191, 2011
52011
You cannot always win the race: Analyzing the lfence/jmp mitigation for branch target injection
A Milburn, K Sun, H Kawakami
arXiv preprint arXiv:2203.04277, 2022
32022
FORTUNA—A framework for the design and development of hardware-based secure systems
R Gallo, H Kawakami, R Dahab
Journal of Systems and Software 86 (8), 2063-2076, 2013
32013
SCuP-Secure Cryptographic Microprocessor
R Gallo, H Kawakami, R Dahab
Anais do XI Simpósio Brasileiro em Segurança da Informação e de Sistemas …, 2011
32011
A hardware trusted computing base for direct recording electronic vote machines
R Gallo, H Kawakami, R Dahab, R Azevedo, S Lima, G Araujo
Austin, Texas, USA, 2010
32010
Hardware security module equipment with native implementation of a cryptographic key management communication protocol and remote confidence enhancement method for …
AB JÚNIOR, CPL Gouvea, FKA Yamamoto, GF Mandaji, AT Sasaki, ...
US Patent App. 16/639,963, 2020
22020
A mathematical modeling of exploitations and mitigation techniques using set theory
R Branco, K Hu, H Kawakami, K Sun
2018 IEEE Security and Privacy Workshops (SPW), 323-328, 2018
22018
ACBuilder: A tool for hardware architecture security evaluation
H Kawakami, D Ott, HC Wong, R Dahab, R Gallo
2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016
12016
Efficient mitigation of side-channel based attacks against speculative execution processing architectures
R Branco, K Hu, K Sun, H Kawakami
US Patent 11,544,070, 2023
2023
Per thread side channel attack protection
K Sun, K Hu, HDM Kawakami, R Branco
US Patent 11,314,861, 2022
2022
A framework for hardware security evaluation: Um framework para a avaliação de segurança de hardware
HM Kawakami, R Dahab, LE Buzato, E Borin, HC Wong
[sn], 2015
2015
Secure Methods for Device Identification by the use of the Data Flow Problem
RD HENRIQUE DE MEDEIROS KAWAKAMI, ROBERTO ALVES GALLO FILHO
BR Patent BR 10 2012 005795 6 A2, 2014
2014
MÉtodos Seguros De IdentificaÇÃo De Dispositivos Baseados No Problema Do Escoamento De Dados
D Ricardo, GR Alves Filho, KH De Medeiros
2014
External cipher and authentication device for use with keyboard units
GCSDA Henrique de Medeiros Kawakami, Roberto Alves Gallo Filho
WO Patent WO2005003932A1, 2005
2005
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20