Jonathan K. Valamehr, Ph.D.
Affiliations: | 2013 | Electrical and Computer Engineering | University of California, Santa Barbara, Santa Barbara, CA, United States |
Google:
"Jonathan Valamehr"Parents
Sign in to add mentorTimothy Sherwood | grad student | 2013 | UC Santa Barbara | |
(Novel Methods of Augmenting High Performance Processors with Security Hardware.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Valamehr J, Sherwood T, Kastner R, et al. (2013) A 3-D split manufacturing approach to trustworthy system development Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 32: 611-615 |
Valamehr JK, Chase M, Kamara S, et al. (2013) Inspection-resistant memory architectures Ieee Micro. 33: 48-56 |
Wassel HMG, Dai D, Tiwari M, et al. (2012) Opportunities and challenges of using plasmonic components in nanophotonic architectures Ieee Journal On Emerging and Selected Topics in Circuits and Systems. 2: 154-168 |
Valamehr J, Chase M, Kamara S, et al. (2012) Inspection resistant memory: Architectural support for security from physical examination Proceedings - International Symposium On Computer Architecture. 130-141 |
Valamehr J, Huffmire T, Irvine C, et al. (2012) A qualitative security analysis of a new class of 3-D integrated crypto co-processors Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6805: 364-382 |
Tiwari M, Oberg JK, Li X, et al. (2011) Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security Proceedings - International Symposium On Computer Architecture. 189-199 |
Valamehr J, Tiwari M, Sherwood T, et al. (2010) Hardware assistance for trustworthy systems through 3-D integration Proceedings - Annual Computer Security Applications Conference, Acsac. 199-210 |
Huffmire T, Levin T, Bilzor M, et al. (2010) Hardware trust implications of 3-D integration Proceedings of the 5th Workshop On Embedded Systems Security, Wess '10 |
Huffmire T, Brotherton B, Callegari N, et al. (2008) Designing secure systems on reconfigurable hardware Acm Transactions On Design Automation of Electronic Systems. 13 |
Tiwari M, Agrawal B, Mysore S, et al. (2008) A Small cache of large ranges: Hardware methods for efficiently searching, storing, and updating big dataflow tags Proceedings of the Annual International Symposium On Microarchitecture, Micro. 94-105 |