default search action
Ruby B. Lee
Person information
- affiliation: Princeton University, Department of Electrical Engineering, NJ, USA
- affiliation: Hewlett-Packard, Cupertino, CA, USA
- affiliation (PhD): Stanford University, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c124]Zecheng He, Guangyuan Hu, Ruby B. Lee:
CloudShield: Real-time Anomaly Detection in the Cloud. CODASPY 2023: 91-102 - [i22]Guangyuan Hu, Zecheng He, Ruby B. Lee:
SoK: Hardware Defenses Against Speculative Execution Attacks. CoRR abs/2301.03724 (2023) - [i21]Guangyuan Hu, Ruby B. Lee:
Protecting Cache States Against Both Speculative Execution Attacks and Side-channel Attacks. CoRR abs/2302.00732 (2023) - [i20]Guangyuan Hu, Ruby B. Lee:
Random and Safe Cache Architecture to Defeat Cache Timing Attacks. CoRR abs/2309.16172 (2023) - 2021
- [j28]Zecheng He, Tianwei Zhang, Ruby B. Lee:
Attacking and Protecting Data Privacy in Edge-Cloud Collaborative Inference Systems. IEEE Internet Things J. 8(12): 9706-9716 (2021) - [c123]Zecheng He, Srinivas Sunkara, Xiaoxue Zang, Ying Xu, Lijuan Liu, Nevan Wichers, Gabriel Schubiner, Ruby B. Lee, Jindong Chen:
ActionBert: Leveraging User Actions for Semantic Understanding of User Interfaces. AAAI 2021: 5931-5938 - [c122]Ruby B. Lee:
Speculative Execution Attacks and Hardware Defenses. ASHES@CCS 2021: 3 - [c121]Zecheng He, Guangyuan Hu, Ruby B. Lee:
New Models for Understanding and Reasoning about Speculative Execution Attacks. HPCA 2021: 40-53 - [c120]Tianwei Zhang, Jakub Szefer, Ruby B. Lee:
Practical and Scalable Security Verification of Secure Architectures. HASP@MICRO 2021: 2:1-2:9 - [c119]Guangyuan Hu, Zecheng He, Ruby B. Lee:
SoK: Hardware Defenses Against Speculative Execution Attacks. SEED 2021: 108-120 - [i19]Guangyuan Hu, Zecheng He, Ruby B. Lee:
Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support. CoRR abs/2103.06453 (2021) - [i18]Zecheng He, Ruby B. Lee:
CloudShield: Real-time Anomaly Detection in the Cloud. CoRR abs/2108.08977 (2021) - 2020
- [c118]Guangyuan Hu, Tianwei Zhang, Ruby B. Lee:
Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks. HASP@MICRO 2020: 6:1-6:9 - [e5]Jakub Szefer, Weidong Shi, Ruby B. Lee:
HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020. ACM 2020, ISBN 978-1-4503-8898-6 [contents] - [i17]Guangyuan Hu, Zecheng He, Ruby B. Lee:
Smartphone Impostor Detection with Built-in Sensors and Deep Learning. CoRR abs/2002.03914 (2020) - [i16]Zecheng He, Guangyuan Hu, Ruby B. Lee:
New Models for Understanding and Reasoning about Speculative Execution Attacks. CoRR abs/2009.07998 (2020) - [i15]Zecheng He, Srinivas Sunkara, Xiaoxue Zang, Ying Xu, Lijuan Liu, Nevan Wichers, Gabriel Schubiner, Ruby B. Lee, Jindong Chen:
ActionBert: Leveraging User Actions for Semantic Understanding of User Interfaces. CoRR abs/2012.12350 (2020)
2010 – 2019
- 2019
- [c117]Zecheng He, Tianwei Zhang, Ruby B. Lee:
Model inversion attacks against collaborative inference. ACSAC 2019: 148-162 - [c116]Zecheng He, Tianwei Zhang, Ruby B. Lee:
Sensitive-Sample Fingerprinting of Deep Neural Networks. CVPR 2019: 4729-4737 - [c115]Zecheng He, Aswin Raghavan, Guangyuan Hu, Sek M. Chai, Ruby B. Lee:
Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning. TrustCom/BigDataSE 2019: 160-167 - 2018
- [j27]Patrick Schaumont, Ruby B. Lee, Ronald Perez, Guido Bertoni:
Special Section on Secure Computer Architectures. IEEE Trans. Computers 67(3): 305-306 (2018) - [j26]Tianwei Zhang, Ruby B. Lee:
Design, Implementation and Verification of Cloud Architecture for Monitoring a Virtual Machine's Security Health. IEEE Trans. Computers 67(6): 799-815 (2018) - [c114]Tianwei Zhang, Yinqian Zhang, Ruby B. Lee:
Analyzing Cache Side Channels Using Deep Neural Networks. ACSAC 2018: 174-186 - [c113]Sanchuan Chen, Fangfei Liu, Zeyu Mi, Yinqian Zhang, Ruby B. Lee, Haibo Chen, XiaoFeng Wang:
Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses. AsiaCCS 2018: 601-608 - [c112]Yasser Shalabi, Mengjia Yan, Nima Honarmand, Ruby B. Lee, Josep Torrellas:
Record-Replay Architecture as a General Security Framework. HPCA 2018: 180-193 - [c111]Wei-Han Lee, Jorge Ortiz, Bongjun Ko, Ruby B. Lee:
Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors. ICISSP 2018: 139-148 - [e4]Jakub Szefer, Weidong Shi, Ruby B. Lee:
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018. ACM 2018 [contents] - [i14]Wei-Han Lee, Jorge Ortiz, Bongjun Ko, Ruby B. Lee:
Time Series Segmentation through Automatic Feature Learning. CoRR abs/1801.05394 (2018) - [i13]Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:
Blind De-anonymization Attacks using Social Networks. CoRR abs/1801.05534 (2018) - [i12]Zecheng He, Aswin Raghavan, Sek M. Chai, Ruby B. Lee:
Detecting Zero-day Controller Hijacking Attacks on the Power-Grid with Enhanced Deep Learning. CoRR abs/1806.06496 (2018) - [i11]Jakub Szefer, Tianwei Zhang, Ruby B. Lee:
Practical and Scalable Security Verification of Secure Architectures. CoRR abs/1807.01854 (2018) - [i10]Tianwei Zhang, Zecheng He, Ruby B. Lee:
Privacy-preserving Machine Learning through Data Obfuscation. CoRR abs/1807.01860 (2018) - [i9]Zecheng He, Tianwei Zhang, Ruby B. Lee:
VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting. CoRR abs/1808.03277 (2018) - 2017
- [j25]Hao Wu, Fangfei Liu, Ruby B. Lee:
Cloud Server Benchmark Suite for Evaluating New Hardware Architectures. IEEE Comput. Archit. Lett. 16(1): 14-17 (2017) - [c110]Tianwei Zhang, Yinqian Zhang, Ruby B. Lee:
DoS Attacks on Your Memory in Cloud. AsiaCCS 2017: 253-265 - [c109]Zecheng He, Tianwei Zhang, Ruby B. Lee:
Machine Learning Based DDoS Attack Detection from Source Side in Cloud. CSCloud 2017: 114-120 - [c108]Wei-Han Lee, Ruby B. Lee:
Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning. DSN 2017: 297-308 - [c107]Wei-Han Lee, Ruby B. Lee:
Sensor-Based Implicit Authentication of Smartphone Users. DSN 2017: 309-320 - [c106]Tianwei Zhang, Yuan Xu, Yungang Bao, Ruby B. Lee:
CloudShelter: Protecting Virtual Machines' Memory Resource Availability in Clouds. ICCD 2017: 557-564 - [c105]Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:
How to Quantify Graph De-anonymization Risks. ICISSP (Revised Selected Papers) 2017: 84-104 - [c104]Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:
Quantification of De-anonymization Risks in Social Networks. ICISSP 2017: 126-135 - [c103]Tianwei Zhang, Ruby B. Lee:
Host-Based Dos Attacks and Defense in the Cloud. HASP@ISCA 2017: 3:1-3:8 - [c102]Zecheng He, Ruby B. Lee:
How secure is your cache against side-channel attacks? MICRO 2017: 341-353 - [c101]Wei-Han Lee, Xiaochen Liu, Yilin Shen, Hongxia Jin, Ruby B. Lee:
Secure Pick Up: Implicit Authentication When You Start Using the Smartphone. SACMAT 2017: 67-78 - [c100]Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:
Blind De-anonymization Attacks using Social Networks. WPES@CCS 2017: 1-4 - [i8]Wei-Han Lee, Ruby B. Lee:
Multi-sensor authentication to improve smartphone security. CoRR abs/1703.03378 (2017) - [i7]Wei-Han Lee, Ruby B. Lee:
Implicit Sensor-based Authentication of Smartphone Users with Smartwatch. CoRR abs/1703.03523 (2017) - [i6]Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:
Quantification of De-anonymization Risks in Social Networks. CoRR abs/1703.04873 (2017) - [i5]Wei-Han Lee, Xiaochen Liu, Yilin Shen, Hongxia Jin, Ruby B. Lee:
Secure Pick Up: Implicit Authentication When You Start Using the Smartphone. CoRR abs/1708.09366 (2017) - [i4]Wei-Han Lee, Ruby B. Lee:
Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning. CoRR abs/1708.09754 (2017) - 2016
- [j24]Fangfei Liu, Hao Wu, Kenneth Mai, Ruby B. Lee:
Newcache: Secure Cache Architecture Thwarting Cache Side-Channel Attacks. IEEE Micro 36(5): 8-16 (2016) - [j23]Tianwei Zhang, Ruby B. Lee:
Monitoring and Attestation of Virtual Machine Security Health in Cloud Computing. IEEE Micro 36(5): 28-37 (2016) - [j22]Paolo Montuschi, Edward J. McCluskey, Samarjit Chakraborty, Jason Cong, Ramón M. Rodríguez-Dagnino, Fred Douglis, Lieven Eeckhout, Gernot Heiser, Sushil Jajodia, Ruby B. Lee, Dinesh Manocha, Tomás F. Pena, Isabelle Puaut, Hanan Samet, Donatella Sciuto:
State of the Journal. IEEE Trans. Computers 65(7): 2014-2018 (2016) - [c99]Fangfei Liu, Qian Ge, Yuval Yarom, Frank McKeen, Carlos V. Rozas, Gernot Heiser, Ruby B. Lee:
CATalyst: Defeating last-level cache side channel attacks in cloud computing. HPCA 2016: 406-418 - [c98]Jangseop Shin, Hongce Zhang, Jinyong Lee, Ingoo Heo, Yu-Yuan Chen, Ruby B. Lee, Yunheung Paek:
A hardware-based technique for efficient implicit information flow tracking. ICCAD 2016: 94 - [c97]Wei-Han Lee, Ruby B. Lee:
Implicit Sensor-based Authentication of Smartphone Users with Smartwatch. HASP@ISCA 2016: 9:1-9:8 - [c96]Tianwei Zhang, Yinqian Zhang, Ruby B. Lee:
CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds. RAID 2016: 118-140 - [i3]Hao Wu, Fangfei Liu, Ruby B. Lee:
Cloud Server Benchmarks for Performance Evaluation of New Hardware Architecture. CoRR abs/1603.01352 (2016) - [i2]Tianwei Zhang, Yinqian Zhang, Ruby B. Lee:
Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation. CoRR abs/1603.03404 (2016) - 2015
- [j21]Ruby B. Lee:
Rethinking Computers for Cybersecurity. Computer 48(4): 16-25 (2015) - [c95]Burak Erbagci, Fangfei Liu, Cagla Cakir, Nail Etkin Can Akkaya, Ruby B. Lee, Ken Mai:
A 32kB secure cache memory with dynamic replacement mapping in 65nm bulk CMOS. A-SSCC 2015: 1-4 - [c94]Wei-Han Lee, Ruby B. Lee:
Implicit Authentication for Smartphone Security. ICISSP (Revised Selected Papers) 2015: 160-176 - [c93]Wei-Han Lee, Ruby B. Lee:
Multi-sensor Authentication to Improve Smartphone Security. ICISSP 2015: 270-280 - [c92]Fangfei Liu, Hao Wu, Ruby B. Lee:
Can randomized mapping secure instruction caches from side-channel attacks? HASP@ISCA 2015: 4:1-4:8 - [c91]Tianwei Zhang, Ruby B. Lee:
CloudMonatt: an architecture for security health monitoring and attestation of virtual machines in cloud computing. ISCA 2015: 362-374 - [c90]Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, Ruby B. Lee:
Last-Level Cache Side-Channel Attacks are Practical. IEEE Symposium on Security and Privacy 2015: 605-622 - [c89]Adi Fuchs, Ruby B. Lee:
Disruptive prefetching: impact on side-channel attacks and cache designs. SYSTOR 2015: 14:1-14:12 - [e3]Ruby B. Lee, Weidong Shi, Jakub Szefer:
Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015. ACM 2015, ISBN 978-1-4503-3483-9 [contents] - [i1]Yuval Yarom, Qian Ge, Fangfei Liu, Ruby B. Lee, Gernot Heiser:
Mapping the Intel Last-Level Cache. IACR Cryptol. ePrint Arch. 2015: 905 (2015) - 2014
- [c88]Tianwei Zhang, Ruby B. Lee:
New models of cache architectures characterizing information leakage from cache side channels. ACSAC 2014: 96-105 - [c87]Jakub Szefer, Pramod A. Jamkhedkar, Diego Perez-Botero, Ruby B. Lee:
Cyber defenses for physical attacks and insider threats in cloud computing. AsiaCCS 2014: 519-524 - [c86]Ruby B. Lee:
University research in hardware security. Hot Chips Symposium 2014: 1-27 - [c85]Ruby B. Lee:
Security basics. Hot Chips Symposium 2014: 1-32 - [c84]Ruby B. Lee, Vikas Chandra, Leendert van Doorn, David Durham:
HotChips security tutorial. Hot Chips Symposium 2014: 1-5 - [c83]Fangfei Liu, Ruby B. Lee:
Random Fill Cache Architecture. MICRO 2014: 203-215 - [p2]Jakub Szefer, Ruby B. Lee:
Hardware-Enhanced Security for Cloud Computing. Secure Cloud Computing 2014: 57-76 - [e2]Ruby B. Lee, Weidong Shi:
HASP 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014. ACM 2014, ISBN 978-1-4503-2777-0 [contents] - 2013
- [b1]Ruby B. Lee:
Security Basics for Computer Architects. Synthesis Lectures on Computer Architecture, Morgan & Claypool Publishers 2013, ISBN 9781627051552, pp. 1-111 - [c82]Jakub Szefer, Ruby B. Lee:
BitDeposit: Deterring Attacks and Abuses of Cloud Computing Services through Economic Measures. CCGRID 2013: 630-635 - [c81]Diego Perez-Botero, Jakub Szefer, Ruby B. Lee:
Characterizing hypervisor vulnerabilities in cloud computing servers. SCC@ASIACCS 2013: 3-10 - [c80]Pramod A. Jamkhedkar, Jakub Szefer, Diego Perez-Botero, Tianwei Zhang, Gina Triolo, Ruby B. Lee:
A Framework for Realizing Security on Demand in Cloud Computing. CloudCom (1) 2013: 371-378 - [c79]Tianwei Zhang, Fangfei Liu, Si Chen, Ruby B. Lee:
Side channel vulnerability metrics: the promise and the pitfalls. HASP@ISCA 2013: 2 - [c78]Fangfei Liu, Ruby B. Lee:
Security testing of a secure cache design. HASP@ISCA 2013: 3 - [e1]Ruby B. Lee, Weidong Shi:
HASP 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013. ACM 2013, ISBN 978-1-4503-2118-1 [contents] - 2012
- [c77]Gian Carlo Cardarilli, Luca Di Nunzio, Rocco Fazzolari, Marco Re, Ruby B. Lee:
Integration of butterfly and inverse butterfly nets in embedded processors: Effects on power saving. ACSCC 2012: 1457-1459 - [c76]Jakub Szefer, Ruby B. Lee:
Architectural support for hypervisor-secure virtualization. ASPLOS 2012: 437-450 - [c75]Yu-Yuan Chen, Pramod A. Jamkhedkar, Ruby B. Lee:
A software-hardware architecture for self-protecting data. CCS 2012: 14-27 - [c74]Ruby B. Lee, Simha Sethumadhavan, G. Edward Suh:
Hardware enhanced security. CCS 2012: 1052 - [c73]Jakub Szefer, Pramod A. Jamkhedkar, Yu-Yuan Chen, Ruby B. Lee:
Physical attack protection with human-secure virtualization in data centers. DSN Workshops 2012: 1-6 - [c72]Claire Vishik, Ruby B. Lee, Fred Chong:
Building Technologies that Help Cyber-Defense: Hardware-enabled Trust. ISSE 2012: 316-325 - [c71]Tianwei Zhang, Jakub Szefer, Ruby B. Lee:
Security verification of hardware-enabled attestation protocols. MICRO Workshops 2012: 47-54 - [c70]Ruby B. Lee:
Hardware-enhanced access control for cloud computing. SACMAT 2012: 1-2 - 2011
- [j20]Tian Lan, Xiaojun Lin, Mung Chiang, Ruby B. Lee:
Stability and benefits of suboptimal utility maximization. IEEE/ACM Trans. Netw. 19(4): 1194-1207 (2011) - [c69]Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer Rexford:
Eliminating the hypervisor attack surface for a more secure cloud. CCS 2011: 401-412 - [c68]Jakub Szefer, Ruby B. Lee:
A Case for Hardware Protection of Guest VMs from Compromised Hypervisors in Cloud Computing. ICDCS Workshops 2011: 248-252 - [c67]Jakub Szefer, Wei Zhang, Yu-Yuan Chen, David Champagne, King Chan, Will X. Y. Li, Ray C. C. Cheung, Ruby B. Lee:
Rapid single-chip secure processor prototyping on the OpenSPARC FPGA platform. International Symposium on Rapid System Prototyping 2011: 38-44 - [p1]Dahai Xu, Jeffrey S. Dwoskin, Jianwei Huang, Tian Lan, Ruby B. Lee, Mung Chiang:
Key Management in Sensor Networks. Theoretical Aspects of Distributed Computing in Sensor Networks 2011: 741-785 - 2010
- [c66]Jeffrey S. Dwoskin, Mahadevan Gomathisankaran, Yu-Yuan Chen, Ruby B. Lee:
A framework for testing hardware-software security architectures. ACSAC 2010: 387-397 - [c65]Jakub Szefer, Yu-Yuan Chen, Ruby B. Lee:
General-purpose FPGA platform for efficient encryption and hashing. ASAP 2010: 309-312 - [c64]David Champagne, Ruby B. Lee:
Scalable architectural support for trusted software. HPCA 2010: 1-12 - [c63]Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby B. Lee:
NoHype: virtualized cloud infrastructure without the virtualization. ISCA 2010: 350-361 - [c62]Ruby B. Lee, Yu-Yuan Chen:
Processor accelerator for AES. SASP 2010: 16-21
2000 – 2009
- 2009
- [j19]Yedidya Hilewitz, Ruby B. Lee:
A New Basis for Shifters in General-Purpose Processors for Existing and Advanced Bit Manipulations. IEEE Trans. Computers 58(8): 1035-1048 (2009) - [j18]Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres:
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. Trans. Comput. Sci. 4: 1-22 (2009) - [c61]Mahadevan Gomathisankaran, Ruby B. Lee:
Tantra: A Fast PRNG Algorithm and its Implementation. Security and Management 2009: 593-598 - [c60]Tian Lan, Ruby B. Lee, Mung Chiang:
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks. GLOBECOM 2009: 1-8 - [c59]Yu-Yuan Chen, Ruby B. Lee:
Hardware-Assisted Application-Level Access Control. ISC 2009: 363-378 - [c58]Eric Keller, Ruby B. Lee, Jennifer Rexford:
Accountability in hosted virtual networks. VISA 2009: 29-36 - [c57]Chun Hok Ho, Wayne Luk, Jakub Szefer, Ruby B. Lee:
Tuning instruction customisation for reconfigurable system-on-chip. SoCC 2009: 61-64 - [c56]Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhaskara, Thuy D. Nguyen, Paul C. Clark, Ruby B. Lee, Cynthia E. Irvine, Terry Benzel:
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture. TRUST 2009: 133-152 - 2008
- [j17]Zhijie Jerry Shi, Xiao Yang, Ruby B. Lee:
Alternative application-specific processor architectures for fast arbitrary bit permutations. Int. J. Embed. Syst. 3(4): 219-228 (2008) - [j16]Yedidya Hilewitz, Ruby B. Lee:
Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors. J. Signal Process. Syst. 53(1-2): 145-169 (2008) - [c55]Yedidya Hilewitz, Cédric Lauradoux, Ruby B. Lee:
Bit matrix multiplication in commodity processors. ASAP 2008: 7-12 - [c54]Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee:
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. FSE 2008: 173-188 - [c53]Tian Lan, Xiaojun Lin, Mung Chiang, Ruby B. Lee:
How Bad is Suboptimal Rate Allocation? INFOCOM 2008: 321-325 - [c52]David Champagne, Reouven Elbaz, Ruby B. Lee:
The Reduced Address Space (RAS) for Application Memory Authentication. ISC 2008: 47-63 - [c51]Zhenghong Wang, Ruby B. Lee:
A novel cache architecture with enhanced performance and security. MICRO 2008: 83-93 - [c50]David Champagne, Reouven Elbaz, Catherine H. Gebotys, Lionel Torres, Ruby B. Lee:
Forward-Secure Content Distribution to Reconfigurable Hardware. ReConFig 2008: 450-455 - 2007
- [j15]