Follow
Henrique Kawakami
Henrique Kawakami
Verified email at intel.com
Title
Cited by
Cited by
Year
Efficient mitigation of side-channel based attacks against speculative execution processing architectures
R Branco, K Hu, K Sun, H Kawakami
US Patent 11,119,784, 2021
262021
Security and system architecture: Comparison of Android customizations
R Gallo, P Hongo, R Dahab, LC Navarro, H Kawakami, K Galvão, ...
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
242015
T-DRE: a hardware trusted computing base for direct recording electronic vote machines
R Gallo, H Kawakami, R Dahab, R Azevedo, S Lima, G Araujo
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
132010
You cannot always win the race: Analyzing the lfence/jmp mitigation for branch target injection
A Milburn, K Sun, H Kawakami
arXiv preprint arXiv:2203.04277, 2022
122022
On device identity establishment and verification
R Gallo, H Kawakami, R Dahab
European Public Key Infrastructure Workshop, 130-145, 2009
92009
Case study: on the security of key storage on PCs
R Gallo, H Kawakami, R Dahab
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
62013
Hardware security evaluation using assurance case models
H Kawakami, R Gallo, R Dahab, E Nascimento
2015 10th International Conference on Availability, Reliability and Security …, 2015
52015
FORTUNA-A probabilistic framework for early design stages of hardware-based secure systems
R Gallo, H Kawakami, R Dahab
2011 5th International Conference on Network and System Security, 184-191, 2011
52011
SCuP-Secure Cryptographic Microprocessor
R Gallo, H Kawakami, R Dahab
Anais do XI Simpósio Brasileiro em Segurança da Informação e de Sistemas …, 2011
42011
FORTUNA—A framework for the design and development of hardware-based secure systems
R Gallo, H Kawakami, R Dahab
Journal of Systems and Software 86 (8), 2063-2076, 2013
32013
A hardware trusted computing base for direct recording electronic vote machines
R Gallo, H Kawakami, R Dahab, R Azevedo, S Lima, G Araujo
Austin, Texas, USA, 2010
32010
Hardware security module equipment with native implementation of a cryptographic key management communication protocol and remote confidence enhancement method for …
AB JÚNIOR, CPL Gouvea, FKA Yamamoto, GF Mandaji, AT Sasaki, ...
US Patent App. 16/639,963, 2020
22020
A mathematical modeling of exploitations and mitigation techniques using set theory
R Branco, K Hu, H Kawakami, K Sun
2018 IEEE Security and Privacy Workshops (SPW), 323-328, 2018
22018
You Cannot Always Win the Race: Analyzing mitigations for branch target prediction attacks
A Milburn, K Sun, H Kawakami
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 671-686, 2023
12023
ACBuilder: A tool for hardware architecture security evaluation
H Kawakami, D Ott, HC Wong, R Dahab, R Gallo
2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016
12016
The Power of Telemetry: Uncovering Software-Based Side-Channel Attacks on Apple M1/M2 Systems
N Chawla, C Liu, A Chakraborty, I Chervatyuk, K Sun, TM Hamasaki, ...
arXiv preprint arXiv:2306.16391, 2023
2023
Efficient mitigation of side-channel based attacks against speculative execution processing architectures
R Branco, K Hu, K Sun, H Kawakami
US Patent 11,544,070, 2023
2023
Per thread side channel attack protection
K Sun, K Hu, HDM Kawakami, R Branco
US Patent 11,314,861, 2022
2022
A framework for hardware security evaluation= Um framework para a avaliação de segurança de hardware
H de Medeiros Kawakami
[sn], 2015
2015
Secure Methods for Device Identification by the use of the Data Flow Problem
RD HENRIQUE DE MEDEIROS KAWAKAMI, ROBERTO ALVES GALLO FILHO
BR Patent BR 10 2012 005795 6 A2, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–20