Security and system architecture: Comparison of Android customizations R Gallo, P Hongo, R Dahab, LC Navarro, H Kawakami, K Galvão, ... Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015 | 22 | 2015 |
Efficient mitigation of side-channel based attacks against speculative execution processing architectures R Branco, K Hu, K Sun, H Kawakami US Patent 11,119,784, 2021 | 15 | 2021 |
T-DRE: a hardware trusted computing base for direct recording electronic vote machines R Gallo, H Kawakami, R Dahab, R Azevedo, S Lima, G Araujo Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 12 | 2010 |
On device identity establishment and verification R Gallo, H Kawakami, R Dahab Public Key Infrastructures, Services and Applications: 6th European Workshop …, 2010 | 9 | 2010 |
Case study: on the security of key storage on PCs R Gallo, H Kawakami, R Dahab 2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013 | 6 | 2013 |
Hardware security evaluation using assurance case models H Kawakami, R Gallo, R Dahab, E Nascimento 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 5 | 2015 |
FORTUNA-A probabilistic framework for early design stages of hardware-based secure systems R Gallo, H Kawakami, R Dahab 2011 5th International Conference on Network and System Security, 184-191, 2011 | 5 | 2011 |
You cannot always win the race: Analyzing the lfence/jmp mitigation for branch target injection A Milburn, K Sun, H Kawakami arXiv preprint arXiv:2203.04277, 2022 | 3 | 2022 |
FORTUNA—A framework for the design and development of hardware-based secure systems R Gallo, H Kawakami, R Dahab Journal of Systems and Software 86 (8), 2063-2076, 2013 | 3 | 2013 |
SCuP-Secure Cryptographic Microprocessor R Gallo, H Kawakami, R Dahab Anais do XI Simpósio Brasileiro em Segurança da Informação e de Sistemas …, 2011 | 3 | 2011 |
A hardware trusted computing base for direct recording electronic vote machines R Gallo, H Kawakami, R Dahab, R Azevedo, S Lima, G Araujo Austin, Texas, USA, 2010 | 3 | 2010 |
Hardware security module equipment with native implementation of a cryptographic key management communication protocol and remote confidence enhancement method for … AB JÚNIOR, CPL Gouvea, FKA Yamamoto, GF Mandaji, AT Sasaki, ... US Patent App. 16/639,963, 2020 | 2 | 2020 |
A mathematical modeling of exploitations and mitigation techniques using set theory R Branco, K Hu, H Kawakami, K Sun 2018 IEEE Security and Privacy Workshops (SPW), 323-328, 2018 | 2 | 2018 |
ACBuilder: A tool for hardware architecture security evaluation H Kawakami, D Ott, HC Wong, R Dahab, R Gallo 2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016 | 1 | 2016 |
Efficient mitigation of side-channel based attacks against speculative execution processing architectures R Branco, K Hu, K Sun, H Kawakami US Patent 11,544,070, 2023 | | 2023 |
Per thread side channel attack protection K Sun, K Hu, HDM Kawakami, R Branco US Patent 11,314,861, 2022 | | 2022 |
A framework for hardware security evaluation: Um framework para a avaliação de segurança de hardware HM Kawakami, R Dahab, LE Buzato, E Borin, HC Wong [sn], 2015 | | 2015 |
Secure Methods for Device Identification by the use of the Data Flow Problem RD HENRIQUE DE MEDEIROS KAWAKAMI, ROBERTO ALVES GALLO FILHO BR Patent BR 10 2012 005795 6 A2, 2014 | | 2014 |
MÉtodos Seguros De IdentificaÇÃo De Dispositivos Baseados No Problema Do Escoamento De Dados D Ricardo, GR Alves Filho, KH De Medeiros | | 2014 |
External cipher and authentication device for use with keyboard units GCSDA Henrique de Medeiros Kawakami, Roberto Alves Gallo Filho WO Patent WO2005003932A1, 2005 | | 2005 |