B
Brian Rogers
Researcher at North Carolina State University
Publications - 9
Citations - 1042
Brian Rogers is an academic researcher from North Carolina State University. The author has contributed to research in topics: Encryption & Overhead (computing). The author has an hindex of 9, co-authored 9 publications receiving 949 citations.
Papers
More filters
Proceedings ArticleDOI
Scaling the bandwidth wall: challenges in and avenues for CMP scaling
TL;DR: A simple but powerful analytical model is developed to predict the number of on-chip cores that a CMP can support given a limited growth in memory traffic capacity, and it is found that the bandwidth wall can severely limit core scaling.
Journal ArticleDOI
Improving Cost, Performance, and Security of Memory Encryption and Authentication
TL;DR: The new split counters for counter-mode encryption simultaneously eliminate counter overflow problems and reduce per-block counter size and dramatically improve authentication performance and security by using the Galois/counter mode of operation (GCM), which leverages counter- mode encryption to reduce authentication latency and overlap it with memory accesses.
Proceedings ArticleDOI
Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly
TL;DR: This paper proposes address independent seed encryption (AISE), a counter-mode based memory encryption scheme using a novel seed composition, and Bonsai Merkle trees (BMT), a novel MerKle tree-based memory integrity verification technique, to eliminate these system and performance issues associated with prior counter- mode memory encryption and Merkles tree integrity verification schemes.
Proceedings ArticleDOI
SecureME: a hardware-software approach to full system security
TL;DR: This work proposes SecureME, a hardware-software mechanism that provides a secure computing environment that protects an application from hardware attacks by using a secure processor substrate, and also from the Operating System through memory cloaking, permission paging, and system call protection.
Proceedings ArticleDOI
Efficient data protection for distributed shared memory multiprocessors
TL;DR: This work proposes and evaluates techniques to provide efficient encryption and authentication of the data in DSM systems, and derives security requirements for processor-processor communication in DSMs, and finds that different types of coherence messages need different protection.