Loading...
The system can't perform the operation now. Try again later.
Citations per year
Duplicate citations
The following articles are merged in Scholar. Their
combined citations
are counted only for the first article.
Merged citations
This "Cited by" count includes citations to the following articles in Scholar. The ones marked
*
may be different from the article in the profile.
Add co-authors
Co-authors
Follow
New articles by this author
New citations to this author
New articles related to this author's research
Email address for updates
Done
My profile
My library
Metrics
Alerts
Settings
Sign in
Sign in
Get my own profile
Cited by
View all
All
Since 2019
Citations
636
356
h-index
12
10
i10-index
14
11
0
120
60
30
90
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2
4
1
6
1
8
9
9
10
10
20
13
22
16
24
23
15
25
31
19
27
36
58
78
106
48
Public access
View all
View all
7 articles
0 articles
available
not available
Based on funding mandates
Follow
Jason M Fung
Senior Director, Offensive Security Research & Academic Research Engagement,
Intel Corporation
Verified email at intel.com -
Homepage
Security
Computer Architecture
Articles
Cited by
Public access
Title
Sort
Sort by citations
Sort by year
Sort by title
Cited by
Cited by
Year
{HardFails}: Insights into {Software-Exploitable} Hardware Bugs
G Dessouky, D Gens, P Haney, G Persyn, A Kanuparthi, H Khattri, ...
28th USENIX Security Symposium (USENIX Security 19), 213-230
, 2019
101
2019
An in-depth analysis of the impact of processor affinity on network performance
A Foong, J Fung, D Newell
Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004 …
, 2004
101
2004
Component authentication for computer systems
HW Wong, WY Kwong, JM Fung
US Patent App. 11/486,617
, 2008
79
2008
Reducing branch misprediction penalties via dynamic control independence detection
Y Chou, J Fung, JP Shen
Proceedings of the 13th international conference on Supercomputing, 109-118
, 1999
64
1999
Verifying information flow properties of firmware using symbolic execution
P Subramanyan, S Malik, H Khattri, A Maiti, J Fung
2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), 337-342
, 2016
57
2016
Architectural characterization of processor affinity in network processing
A Foong, J Fung, D Newell, S Abraham, P Irelan, A Lopez-Estrada
IEEE International Symposium on Performance Analysis of Systems and Software …
, 2005
54
2005
Formal security verification of concurrent firmware in SoCs using instruction-level abstraction for hardware
BY Huang, S Ray, A Gupta, JM Fung, S Malik
Proceedings of the 55th Annual Design Automation Conference, 1-6
, 2018
34
2018
Wireless Hotspot Attack Detection
MM Mirashrafi, JM Fung, J Satapathy, SB Godse, M Yelamanchi, ...
US Patent 9,705,913
, 2017
23
2017
An exhaustive approach to detecting transient execution side channels in RTL designs of processors
MR Fadiheh, A Wezel, J Müller, J Bormann, S Ray, JM Fung, S Mitra, ...
IEEE Transactions on Computers 72 (1), 222-235
, 2022
19
2022
Toward hardware-based IP vulnerability detection and post-deployment patching in systems-on-chip
B Tan, R Elnaggar, JM Fung, R Karri, K Chakrabarty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …
, 2020
18
2020
Formal verification of security critical hardware-firmware interactions in commercial SoCs
S Ray, N Ghosh, RJ Masti, A Kanuparthi, JM Fung
Proceedings of the 56th Annual Design Automation Conference 2019, 1-4
, 2019
14
2019
Hardware based technique to prevent critical fine-grained cache side-channel attacks
A Basak, A Kanuparthi, NN Kodalapura, JM Fung
US Patent 11,144,468
, 2021
12
2021
Two sides of the same coin: Boons and banes of machine learning in hardware security
W Liu, CH Chang, X Wang, C Liu, JM Fung, M Ebrahimabadi, N Karimi, ...
IEEE Journal on Emerging and Selected Topics in Circuits and Systems 11 (2 …
, 2021
12
2021
Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design
B Ahmad, WK Liu, L Collini, H Pearce, JM Fung, J Valamehr, M Bidmeshki, ...
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided …
, 2022
10
2022
Improved Linux SMP Scaling: User-directed Processor Affinity
A Foong, J Fung, D Newell
Intel Software Network Articles
, 2011
7
2011
Hardware-supported patching of security bugs in hardware IP blocks
WK Liu, B Tan, JM Fung, R Karri, K Chakrabarty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …
, 2022
6
2022
Methodology of assessing information leakage through software-accessible telemetries
C Liu, M Kar, X Wang, N Chawla, N Roggel, B Yuce, JM Fung
2021 IEEE International Symposium on Hardware Oriented Security and Trust …
, 2021
5
2021
When a patch is not enough-hardfails: Software-exploitable hardware bugs
G Dessouky, D Gens, P Haney, G Persyn, A Kanuparthi, H Khattri, ...
arXiv preprint arXiv:1812.00197
, 2018
5
2018
Automating hardware security property generation
R Kastner, F Restuccia, A Meza, S Ray, J Fung, C Sturton
Proceedings of the 59th ACM/IEEE Design Automation Conference, 1384-1387
, 2022
4
2022
Device, System, and Method for Processor-based Data Protection
G Prakash, JM Fung, C Rhodes, S Aissi
US Patent 9,569,633
, 2017
4
2017
The system can't perform the operation now. Try again later.
Articles 1–20
Show more
Privacy
Terms
Help
About Scholar
Search help