Selected Papers in Secure Information Processing:

 

A.  Bit Permutation Papers:

 

Alternative Methods to Achieve arbitrary n-bit permutations in O(log(n))  instructions:

1.      R. B. Lee, Z. Shi, and X. Yang, “Efficient Permutation Instructions for Fast Software Cryptography,” IEEE Micro, vol. 21, no. 6, pp. 56-69, December 2001.

2.      Zhijie Shi and Ruby B. Lee, “Bit Permutation Instructions for Accelerating Software Cryptography”, Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors, pp. 138-148, July 2000.

3.      Xiao Yang, Manish Vachharajani, and Ruby B. Lee, “Fast Subword Permutation Instructions Based on Butterfly Networks”, Proceedings of SPIE Media Processors 2000, pp. 80-86, January 2000.

4.      Xiao Yang and Ruby B. Lee, “Fast Subword Permutation Instructions Using Omega and Flip Network Stages”, Proceedings of the International Conference on Computer Design, pp. 15-22, September 2000.

5.      John P. McGregor and Ruby B. Lee, “Architectural Techniques for Accelerating Subword Permutations with Repetitions”, IEEE Transactions on Very Large Scale Integration Systems, vol. 11, no. 3, pp. 325-335, June 2003.

6.      Zhijie Jerry Shi and Ruby B. Lee, “Implementation Complexity of Bit Permutation Instructions”, Proceedings of the Asilomar Conference on Signals, Systems, and Computers, November 2003.

Cryptographic Properties and Sorting Efficiency of Permutation Instructions:

7.      R. B. Lee, R. L. Rivest, M.J.B. Robshaw, Z.J. Shi, and Y.L. Yin, “On Permutation Operations in Cipher Design”, Proceedings of the International Conference on Information Technology (ITCC), April 2004.

8.      Zhijie Shi and Ruby B. Lee, “Subword Sorting with Versatile Permutation Instructions”, Proceedings of the International Conference on Computer Design (ICCD 2002), pp. 234-241, September 2002.

Achieving arbitrary permutations in O(1) cycles:

9.      Ruby B. Lee, Zhijie Shi and Xiao Yang, “How a Processor can Permute n bits in O(1) cycles.” Hot Chips conference, August 2002.

10.  Zhijie Shi, Xiao Yang and Ruby B. Lee, “Arbitrary Bit Permutations in One or Two Cycles”, Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP 2003), pp. 237-247, June 2003.

11.  Ruby B. Lee, Xiao Yang and Zhijie Shi, “Validating word-oriented processors for bit and multi-word operations”, Proceedings of the Asia-Pacific Computer Systems Architecture Conference (ACSAC), September 2004.

Thesis

12.  Zhijie Jerry Shi, “Bit Permutation Instructions: Architecture, Implementation and Cryptographic Properties,  Princeton University Ph.D. dissertation, March 2004.

 

B.  Attack Resistant Architecture

 

DDoS and SRAS:

13.  John P. McGregor, David K. Karig, Zhijie Shi and Ruby B. Lee, "A Processor Architecture Defense against Buffer Overflow Attacks", Proceedings of IEEE International Conference on Information Technology: Research and Education (ITRE 2003), pp. 243-250, August 2003.

14.  Ruby B. Lee, David K. Karig, John P. McGregor, and Zhijie Shi, "Enlisting Hardware Architecture to Thwart Malicious Code Injection," Proceedings of the International Conference on Security in Pervasive Computing (SPC-2003), Lecture Notes in Computer Science, Springer Verlag, March 2003.

15.  Stephen Specht and Ruby B. Lee, “Taxonomies of DDoS Attacks, Tools and Countermeasures”, Proceedings of PDCS 2004, October 2004.

16.  David Karig and Ruby B. Lee, Remote Denial of Service Attacks and Countermeasures, Princeton University Department of Electrical Engineering Technical Report CE-L2001-002, October 2001.

 

Other Attack-Resistant:

17.  A. Murat Fiskiran and Ruby B. Lee, “Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution”, to be published in the International Conference on Computer Design (ICCD), October 2004.

18.  John P. McGregor, Yiqun L. Yin, and Ruby B. Lee, "Efficient Traitor Tracing Using RSA," Princeton University Department of Electrical Engineering Technical Report CE-L2003-004, May 2003.

19.  John P.  McGregor and Ruby B. Lee, “Virtual Secure Co-Processing on General-purpose Processors,” Princeton University Department of Electrical Engineering Technical Report CE-L2002-003, November 2002.

20.  John P. McGregor and Ruby B. Lee, “Protecting Cryptographic Keys and Computations via Virtual Secure Coprocessing,  11th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Workshop on Architectural Support for Security and Anti-virus (WASSA), October 9-13, 2004.

 

Secure Embedded Systems:

21.  Paul Kocher, Ruby B. Lee, Gary McGraw, Anand Ranganathan and Srivaths Ravi, “Security as a new dimension in Embedded System Design”, Proceedings of Design Automation Conference, June 2004.

22.  Ruby Lee, “Processor Architectures for Efficient Secure Information Processing”, 41st. Design Automation Conference invited talks, June 2004 (http://videos.dac.com/41st/46_3/46-3.html)

 

PAX and ECC:

23.  A. Murat Fiskiran and Ruby B. Lee, “PAX: A Datapath-Scalable Minimalist Cryptographic Processor for Mobile Environments”, Book chapter in Embedded Cryptographic Hardware: Design and Security, Nova Science Publishers, NY, USA, 2004.

24.  Princeton Architecture Laboratory for Multimedia and Security (PALMS), PAX Project, <http://palms.ee.princeton.edu/PAX>.

25.  A. Murat Fiskiran and Ruby B. Lee, “Evaluating Instruction Set Extensions for Fast Arithmetic on Binary Finite Fields”, to be published in Proceedings of the International Conference on Application-Specific Systems, Architectures, and Processors (ASAP),  Sept 2004.

26.  A. Murat Fiskiran and Ruby B. Lee, “ Performance Scaling of Cryptography Operations in Servers and Mobile Clients’, to be published in ASPLOS/Beacon Workshop, Oct 2004.

27.  A. Murat Fiskiran and Ruby B. Lee, “Workload Characterization of Elliptic Curve Cryptography and other Network Security Algorithms for Constrained Environments”, Proceedings of the IEEE International Workshop on Workload Characterization, pp. 127-137, Nov 2002.

 

Older version:
Secure Information Processing:

  • John P. McGregor and Ruby B. Lee. Performance Impact of Data Compression on Virtual Private Network Transactions. Proceedings of the 25th IEEE Conference on Local Computer Networks,  pp. 500-510, November 2000.
    [PDF version][PS version]
  • Xiao Yang and Ruby Lee. Fast Subword Permutation Instructions Using Omega and Flip Network Stages. Proceedings of the International Conference on Computer Design, pp. 15-22, September 2000.  [PDF version][PS version]
  • Zhijie Shi and Ruby Lee. Bit Permutation Instructions for Accelerating Software Cryptography.  Proceedings of the IEEE International Conference on Application-specific Systems, Architectures and Processors, pp. 138-148. July 2000.
    [PDF version][PS version]
  • Xiao Yang, Manish Vachharajani and Ruby B. Lee.  Fast Subword Permutation Instructions Based on Butterfly Networks. Proceedings of Media Processors 2000, pp. 80-86.  January 27-28, 2000. [PDF version][PS version]