Ted Huffmire

According to our database1, Ted Huffmire authored at least 17 papers between 2006 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Networks on Chip with Provable Security Properties.
IEEE Micro, 2014

2013
A 3-D Split Manufacturing Approach to Trustworthy System Development.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2013

SurfNoC: a low latency and provably non-interfering approach to secure networks-on-chip.
Proceedings of the 40th Annual International Symposium on Computer Architecture, 2013

2012
Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012

A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Security Checkers: Detecting processor malicious inclusions at runtime.
Proceedings of the HOST 2011, 2011

2010
Security Primitives for Reconfigurable Hardware-Based Systems.
ACM Trans. Reconfigurable Technol. Syst., 2010

Hardware trust implications of 3-D integration.
Proceedings of the 5th Workshop on Embedded Systems Security, 2010

Hardware assistance for trustworthy systems through 3-D integration.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2008
Designing secure systems on reconfigurable hardware.
ACM Trans. Design Autom. Electr. Syst., 2008

Managing Security in FPGA-Based Embedded Systems.
IEEE Des. Test Comput., 2008

Enforcing memory policy specifications in reconfigurable hardware.
Comput. Secur., 2008

Trustworthy System Security through 3-D Integrated Hardware.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008

Threats and Challenges in Reconfigurable Hardware Security.
Proceedings of the 2008 International Conference on Engineering of Reconfigurable Systems & Algorithms, 2008

2007
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

2006
Policy-Driven Memory Protection for Reconfigurable Hardware.
Proceedings of the Computer Security, 2006

Wavelet-based phase classification.
Proceedings of the 15th International Conference on Parallel Architectures and Compilation Techniques (PACT 2006), 2006


  Loading...