Search Results

open access

How to Hide Secrets from Operating System: Architecture Level Support for Dynamic Address Trace Obfuscation

Description: This technical report addresses how to hide secrets from an operating system. The authors provide a detailed design for the VM blackbox and some microarchitecture level simulation derived performance data. They also describe a compiler directed prefetch scheme that uses both instruction and data prefetches to obfuscate the address traces on the address bus between on-chip L2 cache and memory.
Date: 2004
Creator: Gomathisankaran, Mahadevan & Tyagi, Akhilesh
Partner: UNT College of Engineering
open access

Incorporating Emoji Descriptions Improves Tweet Classification

Description: Article presenting a simple strategy to process emojis in Tweets: replace them with their natural language description and use pretrained word embeddings as normally done with standard words. Results show that this strategy is more effective than using pretrained emoji embeddings for tweet classification.
Date: June 2019
Creator: Singh, Abhishek K.; Blanco, Eduardo & Jin, Wei
Partner: UNT College of Engineering
open access

Investing Data with Untrusted Parties using HE

Description: Article proposing the use of anonymization techniques coupled with graph algorithms over homomorphically encrypted (HE) graphs as a basis of analysis for this accumulated data. This approach ensures individuals’ privacy and anonymity while preserving the usefulness of the plaintext data. This article was originally presented at the 18th International Conference on Security and Cryptography - SECRYPT.
Date: 2021
Creator: Dockendorf, Mark; Dantu, Ram; Morozov, Kirill & Bhowmick, Sanjukta
Partner: UNT College of Engineering
Back to Top of Screen