フォロー
Kekai Hu
Kekai Hu
Principal Security Researcher, Intel
確認したメール アドレス: intel.com
タイトル
引用先
引用先
Efficient mitigation of side-channel based attacks against speculative execution processing architectures
R Branco, K Hu, K Sun, H Kawakami
US Patent 11,119,784, 2021
262021
System-level security for network processors with hardware monitors
K Hu, T Wolf, T Teixeira, R Tessier
Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014
182014
Scalable hardware monitors to protect network processors from data plane attacks
K Hu, H Chandrikakutty, R Tessier, T Wolf
2013 IEEE Conference on Communications and Network Security (CNS), 314-322, 2013
142013
Multi-task support for security-enabled embedded processors
T Thomas, A Pouraghily, K Hu, R Tessier, T Wolf
2015 IEEE 26th International Conference on Application-specific Systems …, 2015
92015
A new memory type against speculative side channel attacks
K Sun, R Branco, K Hu
Intel—STrategic Offensive Research & Mitigations (STORM), 2019
82019
Securing network processors with high-performance hardware monitors
T Wolf, HK Chandrikakutty, K Hu, D Unnikrishnan, R Tessier
IEEE Transactions on Dependable and Secure Computing 12 (6), 652-664, 2014
82014
Securing Network Processors with High-Performance Hardware Monitors
T Wolf, H Chandrikakutty, K Hu, D Unnikrishnan, R Tessier
Dependable and Secure Computing, IEEE Transactions on, 2014
82014
Dynamic hardware monitors for network processor protection
K Hu, HK Chandrikakutty, Z Goodman, R Tessier, T Wolf
IEEE Transactions on Computers 65 (3), 860-872, 2015
72015
Mitigation of return-oriented programming exploits
K Sun, R Branco, K Hu
US Patent 11,256,807, 2022
62022
一种基于改进型谱减法的语音强新算法
胡科开, 吴凭天, 杨磊, 陈波
大众科技 10 (9), 25-26, 2008
52008
Reconfigurable network router security
R Tessier, T Wolf, K Hu, H Chandrikakutty, PE Gaillardon
Reconfigurable logic: architecture, tools, and applications, 2018
32018
A mathematical modeling of exploitations and mitigation techniques using set theory
R Branco, K Hu, H Kawakami, K Sun
2018 IEEE Security and Privacy Workshops (SPW), 323-328, 2018
22018
High-performance implementation of in-network traffic pacing for small-buffer networks
YS Hanay, A Dwaraki, K Hu, T Wolf
Computer communications 36 (13), 1450-1459, 2013
22013
Fine grained control flow enforcement to mitigate malicious call/jump oriented programming
K Hu, K Sun, R Branco
US Patent 11,327,755, 2022
12022
Efficient mitigation of side-channel based attacks against speculative execution processing architectures
R Branco, K Hu, K Sun, H Kawakami
US Patent 11,544,070, 2023
2023
Methods and apparatus for implementing a secure database using programmable integrated circuits with dynamic partial reconfigurability
K Hu, A Das
US Patent 11,475,145, 2022
2022
Context-based memory indirect branch target prediction
K Sun, R Branco, K Hu, J Brandt
US Patent App. 17/128,814, 2022
2022
Context-based loop branch prediction
K Sun, R Branco, K Hu
US Patent App. 17/128,816, 2022
2022
Per thread side channel attack protection
K Sun, K Hu, HDM Kawakami, R Branco
US Patent 11,314,861, 2022
2022
Use-after-free exploit prevention architecture
RR Branco, K Hu, K Sun
US Patent 11,074,200, 2021
2021
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20