Alperen Bolat
YOU?
Author Swipe
View article: Microarchitecture Design and Benchmarking of Custom SHA-3 Instruction for RISC-V
Microarchitecture Design and Benchmarking of Custom SHA-3 Instruction for RISC-V Open
Integrating cryptographic accelerators into modern CPU architectures presents unique microarchitectural challenges, particularly when extending instruction sets with complex and multistage operations. Hardware-assisted cryptographic instru…
View article: Advancing SQL Injection Detection for High-Speed Data Centers: A Novel Approach Using Cascaded NLP
Advancing SQL Injection Detection for High-Speed Data Centers: A Novel Approach Using Cascaded NLP Open
Detecting SQL Injection (SQLi) attacks is crucial for web-based data center security, but it is challenging to balance accuracy and computational efficiency, especially in high-speed networks. Traditional methods struggle with this balance…
View article: ERIC: An Efficient and Practical Software Obfuscation Framework
ERIC: An Efficient and Practical Software Obfuscation Framework Open
Modern cloud computing systems distribute software executables over a network to keep the software sources, which are typically compiled in a security-critical cluster, secret. We develop ERIC, a new, efficient, and general software obfusc…
View article: A Microprocessor Protection Architecture against Hardware Trojans in Memories
A Microprocessor Protection Architecture against Hardware Trojans in Memories Open
Software exploitable Hardware Trojan Horses (HWTs) have been currently inserted in commercial CPUs and, very recently, in memories. Such attacks may allow malicious users to run their own software or to gain unauthorized privileges over th…