Follow
Xiaofei (Rex) Guo
Xiaofei (Rex) Guo
Lacework
Verified email at lacework.net - Homepage
Title
Cited by
Cited by
Year
Security analysis of concurrent error detection against differential fault analysis
X Guo, D Mukhopadhyay, C Jin, R Karri
Journal of Cryptographic Engineering 5 (3), 153-169, 2015
802015
Recomputing with permuted operands: A concurrent error detection approach
X Guo, R Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2013
722013
Invariance-based concurrent error detection for advanced encryption standard
X Guo, R Karri
Proceedings of the 49th Annual Design Automation Conference, 573-578, 2012
422012
Fault Attacks on AES and Their Countermeasures
S Ali, X Guo, R Karri, D Mukhopadhyay
Secure System Design and Trustable Computing, 163-208, 2016
242016
Provably secure concurrent error detection against differential fault analysis
X Guo, D Mukhopadhyay, R Karri
Cryptology EPrint Archive, 2012
222012
COUNTERMEASURES AGAINST SIDE-CHANNEL ATTACKS ON CRYPTOGRAPHIC ALGORITHMS
X Guo, X Guo, BB Brumley
US Patent 20,150,222,421, 2015
132015
Did we learn from LLC side channel attacks? a cache leakage detection tool for crypto libraries
G Irazoqui, K Cong, X Guo, H Khattri, A Kanuparthi, T Eisenbarth, B Sunar
arXiv preprint arXiv:1709.01552, 2017
122017
Cache side channel attack: Exploitability and countermeasures
G Irazoqui, X Guo
Black Hat Asia 2017 (3), 1-72, 2017
122017
NREPO: Normal basis recomputing with permuted operands
X Guo, D Mukhopadhyay, C Jin, R Karri
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
122014
NETWORK INTRUSION COUNTER-INTELLIGENCE
N Yadav, SC Chang, S Gandham, X Guo, HV Nguyen, X Liu, TT Ngo, ...
US Patent 20,190,207,976, 2019
82019
Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets
A DeTrano, N Karimi, R Karri, X Guo, C Carlet, S Guilley
The Scientific World Journal 2015, 2015
72015
Did we learn from LLC side channel attacks
G Irazoqui, K Cong, X Guo, H Khattri, AK Kanuparthi, T Eisenbarth, ...
A Cache Leakage Detection Tool for Crypto Libraries. arXiv abs/1709.01552, 2017
62017
Low-Cost Concurrent Error Detection for GCM and CCM
X Guo, R Karri
Journal of Electronic Testing 30 (6), 725-737, 2014
62014
Numchecker: A system approach for kernel rootkit detection and identification
X Wang, X Guo
Black Hat Asia, 2016
52016
Exploiting small leakages in masks to turn a second-order attack into a first-order attack
A DeTrano, S Guilley, X Guo, N Karimi, R Karri
Proceedings of the Fourth Workshop on Hardware and Architectural Support for …, 2015
42015
Simulation and analysis of negative-bias temperature instability aging on power analysis attacks
X Guo, N Karimi, F Regazzoni, C Jin, R Karri
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
42015
Can algorithm diversity in stream cipher implementation thwart (natural and) malicious faults?
X Guo, C Jin, C Zhang, A Papadimitriou, D Hély, R Karri
IEEE Transactions on Emerging Topics in Computing 4 (3), 363-373, 2015
22015
CSAW 2009 team report (Polytechnic Institute of NYU). CSAW Embedded System Challenge
R Guo, S Kannan, W Liu, X Wang
22011
Provably secure concurrent error detection for, advanced encryption standard
X Guo
ePrint Archive, 552, 0
2
Fault attacks and countermeasures on symmetric key cryptographic algorithms
X Guo
POLYTECHNIC INSTITUTE OF NEW YORK UNIVERSITY, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–20