Xiaofei Guo
Xiaofei Guo
Cisco Tetration
Verified email at cisco.com - Homepage
Title
Cited by
Cited by
Year
Security analysis of concurrent error detection against differential fault analysis
X Guo, D Mukhopadhyay, C Jin, R Karri
Journal of Cryptographic Engineering 5 (3), 153-169, 2015
642015
Recomputing with permuted operands: A concurrent error detection approach
X Guo, R Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2013
642013
Invariance-based concurrent error detection for advanced encryption standard
X Guo, R Karri
Proceedings of the 49th Annual Design Automation Conference, 573-578, 2012
402012
Provably Secure Concurrent Error Detection Against Differential Fault Analysis.
X Guo, D Mukhopadhyay, R Karri
IACR Cryptology ePrint Archive 2012, 552, 2012
202012
Fault Attacks on AES and Their Countermeasures
S Ali, X Guo, R Karri, D Mukhopadhyay
Secure System Design and Trustable Computing, 163-208, 2016
162016
NREPO: Normal basis recomputing with permuted operands
X Guo, D Mukhopadhyay, C Jin, R Karri
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
122014
Cache side channel attack: Exploitability and countermeasures
G Irazoqui, X Guo
Black Hat Asia 2017 (3), 1-72, 2017
92017
Did we learn from LLC side channel attacks? a cache leakage detection tool for crypto libraries
G Irazoqui, K Cong, X Guo, H Khattri, A Kanuparthi, T Eisenbarth, B Sunar
arXiv preprint arXiv:1709.01552, 2017
82017
COUNTERMEASURES AGAINST SIDE-CHANNEL ATTACKS ON CRYPTOGRAPHIC ALGORITHMS
X Guo, X Guo, BB Brumley
US Patent 20,150,222,421, 2015
52015
Low-Cost Concurrent Error Detection for GCM and CCM
X Guo, R Karri
Journal of Electronic Testing 30 (6), 725-737, 2014
52014
Numchecker: A system approach for kernel rootkit detection and identification
X Wang, X Guo
Black Hat Asia, 2016
42016
Exploiting small leakages in masks to turn a second-order attack into a first-order attack
A DeTrano, S Guilley, X Guo, N Karimi, R Karri
Proceedings of the Fourth Workshop on Hardware and Architectural Support for …, 2015
32015
Simulation and analysis of negative-bias temperature instability aging on power analysis attacks
X Guo, N Karimi, F Regazzoni, C Jin, R Karri
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
32015
Can algorithm diversity in stream cipher implementation thwart (natural and) malicious faults?
X Guo, C Jin, C Zhang, A Papadimitriou, D Hély, R Karri
IEEE Transactions on Emerging Topics in Computing 4 (3), 363-373, 2015
22015
NETWORK INTRUSION COUNTER-INTELLIGENCE
N Yadav, SC Chang, S Gandham, X Guo, HV Nguyen, X Liu, TT Ngo, ...
US Patent 20,190,207,976, 2019
12019
Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets
A DeTrano, N Karimi, R Karri, X Guo, C Carlet, S Guilley
The Scientific World Journal 2015, 2015
12015
Fault attacks and countermeasures on symmetric key cryptographic algorithms
X Guo
POLYTECHNIC INSTITUTE OF NEW YORK UNIVERSITY, 2014
12014
Non-overlapping transition encoding for global on-chip interconnect
X Guo, S Lin, W Refai, GS Rose
2009 IEEE International SOC Conference (SOCC), 255-258, 2009
12009
Provably secure concurrent error detection for advanced encryption standard
X Guo, D Mukhopadhyay, R Karri
ePrint Archive, 552, 0
1
LLC Attacks Applicability & Countermeasures
GI Xiaofei Guo
USENIX Engima, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20