Follow
Marcio Juliato
Title
Cited by
Cited by
Year
V2X communications using multiple radio access technologies (multi-RAT)
S Fechtel, KPA Roth, B Gunzelmann, MD Mueck, I Karls, Z Yu, T Clevorn, ...
US Patent 11,304,037, 2022
692022
Intrusion Detection System for In-Vehicle Networks using Sensor Correlation and Integration
H Li, L Zhao, M Juliato, S Ahmed, MR Sastry, LL Yang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
382017
FPGA Implementation of an HMAC Processor based on the SHA-2 Family of Hash Functions
M Juliato, C Gebotys
CACR Technical Report, 2011
342011
A Quantitative Analysis of a Novel SEU-Resistant SHA-2 and HMAC Architecture for Space Missions Security
M Juliato, C Gebotys
IEEE Transactions on Aerospace and Electronic Systems 49 (3), 1536-1554, 2013
222013
Efficient Fault Tolerant SHA-2 Hash Functions for Space Applications
M Juliato, C Gebotys, R Elbaz
2009 IEEE Aerospace Conference (Aeroconf'09), 1-16, 2009
202009
Efficient Fault Tolerant SHA-2 Hash Functions for Space Applications
M Juliato, C Gebotys, R Elbaz
CACR Technical Report, 2009
202009
SEU-Resistant SHA-256 Design for Security in Satellites
M Juliato, C Gebotys
10th International Workshop on Signal Processing for Space Communications …, 2008
182008
Tailoring a Reconfigurable Platform to SHA-256 and HMAC through Custom Instructions and Peripherals
M Juliato, C Gebotys
2009 International Conference on Reconfigurable Computing and FPGAs …, 2009
162009
Sensor Signal Processing to Determine Finger and/or Hand Position
M Juliato
US Patent App. 15/087,385, 2017
152017
An Efficient Fault-Tolerance Technique for the Keyed-Hash Message Authentication Code
M Juliato, C Gebotys
2010 IEEE Aerospace Conference (Aeroconf'10), 1-17, 2010
152010
Teaching Computer Architecture Using an Architecture Description Language
S Rigo, M Juliato, R Azevedo, G Araújo, P Centoducatte
Workshop on Computer Architecture Education (WCAE’04) held in conjunction …, 2004
152004
An Approach for Recovering Satellites and their Cryptographic Capabilities in the Presence of SEUs and Attacks
M Juliato, C Gebotys
NASA/ESA Conference on Adaptive Hardware and Systems, 2008. (AHS'08), 101-108, 2008
142008
An Approach for Recovering Satellites and their Cryptographic Capabilities in the Presence of SEUs and Attacks
M Juliato, C Gebotys
CACR Technical Report, 2008
142008
Anomaly Detection in a Controller Area Network
LL Yang, H Li, L Zhao, M Juliato, S Ahmed, MR Sastry
US Patent App. 15/942,031, 2019
112019
Physics-Based Approach for Attack Detection and Localization in Closed-Loop Controls for Autonomous Vehicles
M Juliato, S Ahmed, M Sastry, LL Yang, V Lesi, L Zhao
US Patent App. 16/021,409, 2019
112019
Methods and Arrangements for Multi-Layer In-Vehicle Network Intrusion Detection and Characterization
CN Gutierrez, M Juliato, S Ahmed, Q Wang, M Sastry, LL Yang, X Liu
US Patent App. 16/727,565, 2020
102020
Hardware random forest: low latency, fully reconfigurable ensemble classification
M Juliato, C Gutierrez, S Ahmed, M Sastry, L Yang, X Liu
US Patent 11,409,286, 2022
92022
A Custom Instruction Approach for Hardware and Software Implementations of Finite Field Arithmetic over F_{2^{163}} using Gaussian Normal Bases
M Juliato, G Araujo, J López, R Dahab
The Journal of VLSI Signal Processing Systems for Signal, Image, and Video …, 2007
82007
Ego Actions in Response to Misbehaving Vehicle Identification
X Liu, L Yang, M Sastry, M Juliato, S Ahmed, C Gutierrez
US Patent App. 16/727,785, 2020
72020
Two-Point Voltage Fingerprinting: Increasing Detectability of ECU Masquerading Attacks
S Ahmed, M Juliato, C Gutierrez, M Sastry
7th Embedded Security in Cars Conference (ESCAR'19), 2019
72019
The system can't perform the operation now. Try again later.
Articles 1–20