Run-time accessible DRAM PUFs in commodity devices W Xiong, A Schaller, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ... Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016 | 97 | 2016 |
Leaking information through cache LRU states W Xiong, J Szefer 2020 IEEE International Symposium on High Performance Computer Architecture …, 2020 | 84 | 2020 |
Intrinsic rowhammer PUFs: Leveraging the rowhammer effect for improved security A Schaller, W Xiong, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ... 2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017 | 83 | 2017 |
Decay-based DRAM PUFs in commodity devices A Schaller, W Xiong, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ... IEEE Transactions on Dependable and Secure Computing 16 (3), 462-475, 2018 | 68 | 2018 |
Survey of transient execution attacks and their mitigations W Xiong, J Szefer ACM Computing Surveys (CSUR) 54 (3), 1-36, 2021 | 67 | 2021 |
A parylene self-locking cuff electrode for peripheral nerve stimulation and recording H Yu, W Xiong, H Zhang, W Wang, Z Li Journal of Microelectromechanical Systems 23 (5), 1025-1035, 2014 | 65 | 2014 |
Secure tlbs S Deng, W Xiong, J Szefer Proceedings of the 46th International Symposium on Computer Architecture …, 2019 | 52 | 2019 |
Fingerprinting cloud FPGA infrastructures S Tian, W Xiong, I Giechaskiel, K Rasmussen, J Szefer Proceedings of the 2020 ACM/SIGDA International Symposium on Field …, 2020 | 44 | 2020 |
Analysis of secure caches using a three-step model for timing-based attacks S Deng, W Xiong, J Szefer Journal of Hardware and Systems Security 3 (4), 397-425, 2019 | 34 | 2019 |
Characterization of mpc-based private inference for transformer-based models Y Wang, GE Suh, W Xiong, B Lefaudeux, B Knott, M Annavaram, ... 2022 IEEE International Symposium on Performance Analysis of Systems and …, 2022 | 30 | 2022 |
Cache timing side-channel vulnerability checking with computation tree logic S Deng, W Xiong, J Szefer Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018 | 27 | 2018 |
Cocktail party attack: Breaking aggregation-based privacy in federated learning using independent component analysis S Kariyappa, C Guo, K Maeng, W Xiong, GE Suh, MK Qureshi, HHS Lee International Conference on Machine Learning, 15884-15899, 2023 | 26 | 2023 |
Mpcvit: Searching for accurate and efficient mpc-friendly vision transformer with heterogeneous attention W Zeng, M Li, W Xiong, T Tong, W Lu, J Tan, R Wang, R Huang Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023 | 25 | 2023 |
A benchmark suite for evaluating caches' vulnerability to timing attacks S Deng, W Xiong, J Szefer Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020 | 25 | 2020 |
Survey of transient execution attacks W Xiong, J Szefer arXiv preprint arXiv:2005.13435, 2020 | 24 | 2020 |
Cloud FPGA cartography using PCIe contention S Tian, I Giechaskiel, W Xiong, J Szefer 2021 IEEE 29th Annual International Symposium on Field-Programmable Custom …, 2021 | 22 | 2021 |
SecChisel framework for security verification of secure processor architectures S Deng, D Gümüşoğlu, W Xiong, S Sari, YS Gener, C Lu, O Demir, ... Proceedings of the 8th International Workshop on Hardware and Architectural …, 2019 | 22 | 2019 |
Intrinsic run-time row hammer PUFs: Leveraging the row hammer effect for run-time cryptography and improved security NA Anagnostopoulos, T Arul, Y Fan, C Hatzfeld, A Schaller, W Xiong, ... Cryptography 2 (3), 13, 2018 | 22 | 2018 |
Ultrahigh-Q, largely deformed microcavities coupled by a free-space laser beam L Shao, L Wang, W Xiong, XF Jiang, QF Yang, YF Xiao Applied Physics Letters 103 (12), 2013 | 21 | 2013 |
Survey of Approaches for Security Verification of Hardware/Software Systems. O Demir, W Xiong, F Zaghloul, J Szefer IACR Cryptol. ePrint Arch. 2016, 846, 2016 | 20 | 2016 |