research
∙
02/01/2023
Protecting Cache States Against Both Speculative Execution Attacks and Side-channel Attacks
Cache side-channel attacks and speculative execution attacks that leak i...
research
∙
08/20/2021
CloudShield: Real-time Anomaly Detection in the Cloud
In cloud computing, it is desirable if suspicious activities can be dete...
research
∙
03/11/2021
Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support
Impostors are attackers who take over a smartphone and gain access to th...
research
∙
08/09/2018
VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting
Deep learning has become popular, and numerous cloud-based services are ...
research
∙
07/05/2018