scispace - formally typeset
B

Brian Rogers

Researcher at North Carolina State University

Publications -  9
Citations -  1042

Brian Rogers is an academic researcher from North Carolina State University. The author has contributed to research in topics: Encryption & Overhead (computing). The author has an hindex of 9, co-authored 9 publications receiving 949 citations.

Papers
More filters
Proceedings ArticleDOI

Scaling the bandwidth wall: challenges in and avenues for CMP scaling

TL;DR: A simple but powerful analytical model is developed to predict the number of on-chip cores that a CMP can support given a limited growth in memory traffic capacity, and it is found that the bandwidth wall can severely limit core scaling.
Journal ArticleDOI

Improving Cost, Performance, and Security of Memory Encryption and Authentication

TL;DR: The new split counters for counter-mode encryption simultaneously eliminate counter overflow problems and reduce per-block counter size and dramatically improve authentication performance and security by using the Galois/counter mode of operation (GCM), which leverages counter- mode encryption to reduce authentication latency and overlap it with memory accesses.
Proceedings ArticleDOI

Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly

TL;DR: This paper proposes address independent seed encryption (AISE), a counter-mode based memory encryption scheme using a novel seed composition, and Bonsai Merkle trees (BMT), a novel MerKle tree-based memory integrity verification technique, to eliminate these system and performance issues associated with prior counter- mode memory encryption and Merkles tree integrity verification schemes.
Proceedings ArticleDOI

SecureME: a hardware-software approach to full system security

TL;DR: This work proposes SecureME, a hardware-software mechanism that provides a secure computing environment that protects an application from hardware attacks by using a secure processor substrate, and also from the Operating System through memory cloaking, permission paging, and system call protection.
Proceedings ArticleDOI

Efficient data protection for distributed shared memory multiprocessors

TL;DR: This work proposes and evaluates techniques to provide efficient encryption and authentication of the data in DSM systems, and derives security requirements for processor-processor communication in DSMs, and finds that different types of coherence messages need different protection.