Gedare Bloom

Publications

This page is presented in reverse chronological order. Please refer to my Research page for a more cohesive and organized approach that highlights my publications in the context of the specific research problems that they address. See also my Google Scholar page. Some pdf links are broken because I cannot redistribute the text; feel free to ask me for an author copy and I will try to oblige.

Theses

  1.  Gedare Bloom,    Operating System Support for Shared Hardware Data Structures,  The George Washington University,  2013.  [ pdf ]

Books

  1.  Gedare Bloom,  Joel Sherrill,  Tingting Hu,  Ivan Cibrario Bertolotti,    Real-Time Systems Development with RTEMS and Multicore Processors,  CRC Press,DOI: 10.1201/9781351255790,  2020.  [ pdf ]

Book Chapters

  1.  Habeeb Olufowobi,  Gedare Bloom,    Chapter 16 - Connected Cars: Automotive Cybersecurity and Privacy for Smart Cities,  in Smart Cities Cybersecurity and Privacy,  pp. 227-240,  Elsevier,DOI: 10.1016/B978-0-12-815032-0.00016-0,  2019.  [ pdf ]

  2.  Gedare Bloom,  Eugen Leontie,  Bhagirath Narahari,  Rahul Simha,    Chapter 12 - Hardware and Security: Vulnerabilities and Solutions,  in Handbook on Securing Cyber-Physical Critical Infrastructure,  pp. 305-331,  Morgan Kaufmann,  2012.  [ pdf ]

Journal Articles

  1.  Paul Agbaje,  Habeeb Olufowobi,  Sena Hounsinou,  Gedare Bloom,    From Weeping to Wailing: A Transitive Stealthy Bus-Off Attack,  in IEEE Transactions on Intelligent Transportation Systems,  pp. 1-15,DOI: 10.1109/TITS.2024.3377179,  2024.  [ pdf ]

  2.  Omolade Ikumapayi,  Habeeb Olufowobi,  Jeremy Daily,  Tingting Hu,  Ivan Cibrario Bertolotti,  Gedare Bloom,    CANASTA: Controller Area Network Authentication Schedulability Timing Analysis,  in IEEE Transactions on Vehicular Technology,  vol. 72,  iss. 8,  pp. 10024-10036,DOI: 10.1109/TVT.2023.3258746,  2023.  [ pdf ]

  3.  Heather Lawrence,  Uchenna Ezeobi,  Orly Tauil,  Jacob Nosal,  Owen Redwood,  Yanyan Zhuang,  Gedare Bloom,    CUPID: A labeled dataset with Pentesting for evaluation of network intrusion detection,  in Journal of Systems Architecture,  vol. 129,  pp. 102621,DOI: 10.1016/j.sysarc.2022.102621,  2022.  [ pdf ]
  4.  Paul Agbaje,  Afia Anjum,  Arkajyoti Mitra,  Emmanuel Oseghale,  Gedare Bloom,  Habeeb Olufowobi,    Survey of Interoperability Challenges in the Internet of Vehicles,  in IEEE Transactions on Intelligent Transportation Systems,  vol. 23,  iss. 12,  pp. 22838-22861,DOI: 10.1109/TITS.2022.3194413,  2022.  [ pdf ]

  5.  James Marshall,  Robert Gifford,  Gedare Bloom,  Gabriel Parmer,  Rahul Simha,    Precise Cache Profiling for Studying Radiation Effects,  in ACM Transactions on Embedded Computing Systems,  vol. 20,  iss. 3,  pp. 25:1-25:25,DOI: 10.1145/3442339,  2021.  [ pdf ]

  6.  Jason Lowe-Power,  Abdul Mutaal Ahmad,  Ayaz Akram,  Mohammad Alian,  Rico Amslinger,  Matteo Andreozzi,  Adrià Armejach,  Nils Asmussen,  Brad Beckmann,  Srikant Bharadwaj,  Gabe Black,  Gedare Bloom,  Bobby R. Bruce,  Daniel Rodrigues Carvalho,  Jeronimo Castrillon,  Lizhong Chen,  Nicolas Derumigny,  Stephan Diestelhorst,  Wendy Elsasser,  Carlos Escuin,  Marjan Fariborz,  Amin Farmahini-Farahani,  Pouya Fotouhi,  Ryan Gambord,  Jayneel Gandhi,  Dibakar Gope,  Thomas Grass,  Anthony Gutierrez,  Bagus Hanindhito,  Andreas Hansson,  Swapnil Haria,  Austin Harris,  Timothy Hayes,  Adrian Herrera,  Matthew Horsnell,  Syed Ali Raza Jafri,  Radhika Jagtap,  Hanhwi Jang,  Reiley Jeyapaul,  Timothy M. Jones,  Matthias Jung,  Subash Kannoth,  Hamidreza Khaleghzadeh,  Yuetsu Kodama,  Tushar Krishna,  Tommaso Marinelli,  Christian Menard,  Andrea Mondelli,  Miquel Moreto,  Tiago Mück,  Omar Naji,  Krishnendra Nathella,  Hoa Nguyen,  Nikos Nikoleris,  Lena E. Olson,  Marc Orr,  Binh Pham,  Pablo Prieto,  Trivikram Reddy,  Alec Roelke,  Mahyar Samani,  Andreas Sandberg,  Javier Setoain,  Boris Shingarov,  Matthew D. Sinclair,  Tuan Ta,  Rahul Thakur,  Giacomo Travaglini,  Michael Upton,  Nilay Vaish,  Ilias Vougioukas,  William Wang,  Zhengrong Wang,  Norbert Wehn,  Christian Weis,  David A. Wood,  Hongil Yoon,  Éder F. Zulian,    The gem5 Simulator: Version 20.0+,  in arXiv:2007.03152 [cs],  2020.  [ pdf ]
  7.  Uchenna Ezeobi,  Habeeb Olufowobi,  Clinton Young,  Joseph Zambreno,  Gedare Bloom,    Reverse Engineering Controller Area Network Messages using Unsupervised Machine Learning,  in IEEE Consumer Electronics Magazine,  pp. 1-1,DOI: 10.1109/MCE.2020.3023538,  2020.  [ pdf ]
  8.  Habeeb Olufowobi,  Clinton Young,  Joseph Zambreno,  Gedare Bloom,    SAIDuCANT: Specification-Based Automotive Intrusion Detection Using Controller Area Network (CAN) Timing,  in IEEE Transactions on Vehicular Technology,  vol. 69,  iss. 2,  pp. 1484-1494,DOI: 10.1109/TVT.2019.2961344,  2020.  [ pdf ]

  9.  Gedare Bloom,  Gianluca Cena,  Ivan Cibrario Bertolotti,  Tingting Hu,  Nicolas Navet,  Adriano Valenzano,    Event Notification in CAN-Based Sensor Networks,  in IEEE Transactions on Industrial Informatics,  vol. 15,  iss. 10,  pp. 5613-5625,DOI: 10.1109/TII.2019.2904082,  2019.  [ pdf ]
  10.  Clinton Young,  Joseph Zambreno,  Habeeb Olufowobi,  Gedare Bloom,    Survey of Automotive Controller Area Network Intrusion Detection Systems,  in IEEE Design Test,  vol. 36,  iss. 6,  pp. 48-55,DOI: 10.1109/MDAT.2019.2899062,  2019.  [ pdf ]
  11.  Udit Kumar Agarwal,  Vara Punit Ashokbhai,  Gedare Bloom,  Christian Mauderer,  Joel Sherrill,    Comparison of File Systems in RTEMS,  in SIGBED Rev.,  vol. 16,  iss. 3,  pp. 39-44,DOI: 10.1145/3373400.3373406,  2019.  [ pdf ]

  12.  Gedare Bloom,  Joel Sherrill,  Gary Gilliland,    Aligning Deos and RTEMS with the FACE Safety Base Operating System Profile,  in SIGBED Rev.,  vol. 15,  iss. 1,  pp. 15-21,DOI: 10.1145/3199610.3199612,  2018.  [ pdf ]

  13.  Gedare Bloom,  Joel Sherrill,    Scheduling and Thread Management with RTEMS,  in SIGBED Rev.,  vol. 11,  iss. 1,  pp. 20-25,DOI: 10.1145/2597457.2597459,  2014.  [ pdf ]

  14.  Eugen Leontie,  Gedare Bloom,  Olga Gelbart,  Bhagirath Narahari,  Rahul Simha,    A Compiler-Hardware Technique for Protecting Against Buffer Overflow Attacks,  in Journal of Information Assurance and Security,  vol. 5,  iss. 1,  pp. 1-8,  2010.  [ pdf ]

  15.  Gedare Bloom,  Bhagirath Narahari,  Rahul Simha,  Joseph Zambreno,    Providing secure execution environments with a last line of defense against Trojan circuit attacks,  in Computers & Security,  vol. 28,  iss. 7,  pp. 660-669,DOI: 10.1016/j.cose.2009.03.002,  2009.  [ pdf ]

Conference and Workshop Papers

  1.  Minhajul Alam Rahat,  Vijay Banerjee,  Gedare Bloom,  Yanyan Zhuang,    Cimalir: Cross-Platform IoT Malware Clustering using Intermediate Representation,  in 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC),  pp. 0460-0466,DOI: 10.1109/CCWC60891.2024.10427663,  2024.  [ pdf ]
  2.  Constance Hendrix,  Gedare Bloom,    Platoon Vulnerability due to Network Topology and Targeted Vehicle,  in 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC),  pp. 771-776,DOI: 10.1109/CCNC51664.2024.10454750,  2024.  [ pdf ]
  3.  Austen Knapp,  Emmanuel Wamuo,  Minhajul Alam Rahat,  Santiago Torres-Arias,  Gedare Bloom,  Yanyan Zhuang,    Should Smart Homes Be Afraid of Evil Maids? : Identifying Vulnerabilities in IoT Device Firmware,  in 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC),  pp. 0467-0473,DOI: 10.1109/CCWC60891.2024.10427780,  2024.  [ pdf ]
  4.  Farhad Mofidi,  Sena G Hounsinou,  Gedare Bloom,    L-IDS: A Multi-Layered Approach to Ransomware Detection in IoT,  in 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC),  pp. 0387-0396,DOI: 10.1109/CCWC60891.2024.10427870,  2024.  [ pdf ]

  5.  Omolade Ikumapayi,  Habeeb Olufowobi,  Jeremy Daily,  Tingting Hu,  Ivan Cibrario Bertolotti,  Gedare Bloom,    Work in Progress: Schedulability Analysis of CAN and CAN FD Authentication,  in 2023 IEEE 29th Real-Time and Embedded Technology and Applications Symposium (RTAS),  pp. 349-352,DOI: 10.1109/RTAS58335.2023.00038,  2023.  [ pdf ]
  6.  Farhad Mofidi,  Sena Hounsinou,  Gedare Bloom,    L-IDS: A lightweight hardware-assisted IDS for IoT systems to detect ransomware attacks,  in Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation,  pp. 464-465,  Association for Computing Machinery,DOI: 10.1145/3576842.3589170,  2023.  [ pdf ]
  7.  Catherine Meadows,  Sena Hounsinou,  Timothy Wood,  Gedare Bloom,    Sidecar-based Path-aware Security for Microservices,  in Proceedings of the 28th ACM Symposium on Access Control Models and Technologies,  pp. 157-162,  Association for Computing Machinery,DOI: 10.1145/3589608.3594742,  2023.  [ pdf ]
  8.  Joshua H. Seaton,  Sena Hounsinou,  Gedare Bloom,  Philip N. Brown,    Competitive Information Provision Among Internet Routing Nodes,  in 2023 American Control Conference (ACC),  pp. 1074-1079,DOI: 10.23919/ACC55779.2023.10156591,  2023.  [ pdf ]

  9.  Paul Agbaje,  Afia Anjum,  Arkajyoti Mitra,  Gedare Bloom,  Habeeb Olufowobi,    A Framework for Consistent and Repeatable Controller Area Network IDS Evaluation,  in Workshop on Automotive and Autonomous Vehicle Security,  Internet Society,  2022.  [ pdf ]
  10.  Joshua H. Seaton,  Sena Hounsinou,  Timothy Wood,  Shouhuai Xu,  Philip N. Brown,  Gedare Bloom,    Poster: Toward Zero-Trust Path-Aware Access Control,  in Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies,  pp. 267-269,  Association for Computing Machinery,DOI: 10.1145/3532105.3535036,  2022.  [ pdf ]
  11.  Adam Duby,  Teryl Taylor,  Gedare Bloom,  Yanyan Zhuang,    Evaluating Feature Robustness for Windows Malware Family Classification,  in 2022 International Conference on Computer Communications and Networks (ICCCN),  pp. 1-10,DOI: 10.1109/ICCCN54977.2022.9868914,  2022.  [ pdf ]
  12.  Vijay Banerjee,  Sena Hounsinou,  Habeeb Olufowobi,  Monowar Hasan,  Gedare Bloom,    Secure Reboots for Real-Time Cyber-Physical Systems,  in Proceedings of the 4th Workshop on CPS & IoT Security and Privacy,  pp. 27-33,  Association for Computing Machinery,DOI: 10.1145/3560826.3563384,  2022.  [ pdf ]
  13.  Heather Lawrence,  Uchenna Ezeobi,  Gedare Bloom,  Yanyan Zhuang,    Shining New Light on Useful Features for Network Intrusion Detection Algorithms,  in 2022 IEEE 19th Annual Consumer Communications Networking Conference (CCNC),  pp. 369-377,DOI: 10.1109/CCNC49033.2022.9700654,  2022.  [ pdf ]
  14.  Vijay Banerjee,  Ryan Rabinowitz,  Mark Stidd,  Rory Lewis,  Philip N. Brown,  Gedare Bloom,    The Tragedy of the Miners,  in 2022 IEEE 19th Annual Consumer Communications Networking Conference (CCNC),  pp. 760-765,DOI: 10.1109/CCNC49033.2022.9700705,  2022.  [ pdf ]
  15.  Adam Duby,  Teryl Taylor,  Gedare Bloom,  Yanyan Zhuang,    Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files,  in 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC),  pp. 0745-0751,DOI: 10.1109/CCWC54503.2022.9720874,  2022.  [ pdf ]

  16.  Richi Dubey,  Vijay Banerjee,  Sena Hounsinou,  Gedare Bloom,    Strong APA scheduling in a real-time operating system: Work-in-progress,  in Proceedings of the 2021 International Conference on Embedded Software,  pp. 47-48,  Association for Computing Machinery,DOI: 10.1145/3477244.3477623,  2021.  [ pdf ]
  17.  Vijay Banerjee,  Sena Hounsinou,  Harrison Gerber,  Gedare Bloom,    Modular Network Stacks in the Real- Time Executive for Multiprocessor Systems,  in 2021 Resilience Week (RWS),  pp. 1-7,DOI: 10.1109/RWS52686.2021.9611788,  2021.  [ pdf ]
  18.  Sena Hounsinou,  Vijay Banerjee,  Chunhao Peng,  Monowar Hasan,  Gedare Bloom,    Work-in-Progress: Enabling Secure Boot for Real-Time Restart-Based Cyber-Physical Systems,  in 2021 IEEE Real-Time Systems Symposium (RTSS),  pp. 524-527,DOI: 10.1109/RTSS52674.2021.00056,  2021.  [ pdf ]
  19.  Sena Hounsinou,  Mark Stidd,  Uchenna Ezeobi,  Habeeb Olufowobi,  Mitra Nasri,  Gedare Bloom,    Vulnerability of Controller Area Network to Schedule-Based Attacks,  in 2021 IEEE Real-Time Systems Symposium (RTSS),  pp. 495-507,DOI: 10.1109/RTSS52674.2021.00051,  2021.  [ pdf ]
  20.  Gedare Bloom,    WeepingCAN: A Stealthy CAN Bus-off Attack,  in Workshop on Automotive and Autonomous Vehicle Security,  Internet Society,DOI: https://dx.doi.org/10.14722/autosec.2021.23002,  2021.  [ pdf ]

  21.  Prajjwal Dangal,  Gedare Bloom,    Towards Industrial Security Through Real-time Analytics,  in 2020 IEEE 23rd International Symposium on Real-Time Distributed Computing (ISORC),  pp. 156-157,DOI: 10.1109/ISORC49007.2020.00036,  2020.  [ pdf ]
  22.  Gedare Bloom,  Joel Sherrill,    Harmonizing ARINC 653 and Realtime POSIX for Conformance to the FACE Technical Standard,  in 2020 IEEE 23rd International Symposium on Real-Time Distributed Computing (ISORC),  pp. 98-105,DOI: 10.1109/ISORC49007.2020.00023,  2020.  [ pdf ]

  23.  Habeeb Olufowobi,  Sena Hounsinou,  Gedare Bloom,    Controller Area Network Intrusion Prevention System Leveraging Fault Recovery,  in Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy,  pp. 63-73,  Association for Computing Machinery,DOI: 10.1145/3338499.3357360,  2019.  [ pdf ]
  24.  Mitra Nasri,  Thidapat Chantem,  Gedare Bloom,  Ryan M. Gerdes,    On the Pitfalls and Vulnerabilities of Schedule Randomization Against Schedule-Based Attacks,  in 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS),  pp. 103-116,DOI: 10.1109/RTAS.2019.00017,  2019.  [ pdf ]
  25.  Habeeb Olufowobi,  Uchenna Ezeobi,  Eric Muhati,  Gaylon Robinson,  Clinton Young,  Joseph Zambreno,  Gedare Bloom,    Anomaly Detection Approach Using Adaptive Cumulative Sum Algorithm for Controller Area Network,  in Proceedings of the ACM Workshop on Automotive Cybersecurity,  pp. 25-30,  ACM,DOI: 10.1145/3309171.3309178,  2019.  [ pdf ]
  26.  Clinton Young,  Habeeb Olufowobi,  Gedare Bloom,  Joseph Zambreno,    Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes,  in Proceedings of the ACM Workshop on Automotive Cybersecurity,  pp. 9-14,  ACM,DOI: 10.1145/3309171.3309179,  2019.  [ pdf ]

  27.  H. Olufowobi,  G. Bloom,  C. Young,  J. Zambreno,    Work-in-Progress: Real-Time Modeling for Intrusion Detection in Automotive Controller Area Network,  in 2018 IEEE Real-Time Systems Symposium (RTSS),  pp. 161-164,DOI: 10.1109/RTSS.2018.00030,  2018.  [ pdf ]
  28.  S. Mohan,  M. Asplund,  G. Bloom,  A. Sadeghi,  A. Ibrahim,  N. Salajageh,  P. Griffioen,  B. Sinipoli,    Special Session: The Future of IoT Security,  in 2018 International Conference on Embedded Software (EMSOFT),  pp. 1-7,DOI: 10.1109/EMSOFT.2018.8537206,  2018.  [ pdf ]
  29.  G. Bloom,  B. Alsulami,  E. Nwafor,  I. C. Bertolotti,    Design patterns for the industrial Internet of Things,  in 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS),  pp. 1-10,DOI: 10.1109/WFCS.2018.8402353,  2018.  [ pdf ]
  30.  Ebelechukwu Nwafor,  Andre Campbell,  Gedare Bloom,    Anomaly-based Intrusion Detection of IoT Device Sensor Data using Provenance Graphs,  in 1st International Workshop on Security and Privacy for the Internet-of-Things,  2018.  [ pdf ]

  31.  C. Tessler,  G. Bloom,  N. Fisher,    Work-in-Progress: Reducing Cache Conflicts via Interrupts and BUNDLE Scheduling,  in 2017 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS),  pp. 125-128,DOI: 10.1109/RTAS.2017.30,  2017.  [ pdf ]
  32.  E. Nwafor,  A. Campbell,  D. Hill,  G. Bloom,    Towards a provenance collection framework for Internet of Things devices,  in 2017 IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced Trusted Computed, Scalable Computing Communications, Cloud Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI),  pp. 1-6,DOI: 10.1109/UIC-ATC.2017.8397531,  2017.  [ pdf ]
  33.  G. Bloom,  G. Cena,  I. C. Bertolotti,  T. Hu,  A. Valenzano,    Supporting security protocols on CAN-based networks,  in 2017 IEEE International Conference on Industrial Technology (ICIT),  pp. 1334-1339,DOI: 10.1109/ICIT.2017.7915557,  2017.  [ pdf ]
  34.  G. Bloom,  G. Cena,  I. C. Bertolotti,  T. Hu,  A. Valenzano,    Optimized event notification in CAN through in-frame replies and Bloom filters,  in 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS),  pp. 1-10,DOI: 10.1109/WFCS.2017.7991963,  2017.  [ pdf ]

  35.  James Marshall,  Gabriel Parmer,  Rahul Simha,  Gedare Bloom,    N-Modular Redundant Real-Time Middleware: Design and Implementation,  in EWiLi 2016,  2016.  [ pdf ]
  36.  Clinton Young,  Joseph Zambreno,  Gedare Bloom,    Towards a Fail-Operational Intrusion Detection System for In-Vehicle Networks,  in Proceedings of the Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS),  2016.  [ pdf ]
  37.  Yuxin Ren,  Gabriel Parmer,  Teo Georgiev,  Gedare Bloom,    CBufs: Efficient, System-wide Memory Management and Sharing,  in Proceedings of the 2016 ACM SIGPLAN International Symposium on Memory Management,  pp. 68-77,  ACM,DOI: 10.1145/2926697.2926703,  2016.  [ pdf ]
  38.  Gedare Bloom,  Gabriel Parmer,  Rahul Simha,    LockDown: An Operating System for Achieving Service Continuity by Quarantining Principals,  in Proceedings of the 9th European Workshop on System Security,  pp. 7:1-7:6,  ACM,DOI: 10.1145/2905760.2905764,  2016.  [ pdf ]
  39.  J. Song,  G. Bloom,  G. Parmer,    SuperGlue: IDL-Based, System-Level Fault Tolerance for Embedded Systems,  in 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),  pp. 227-238,DOI: 10.1109/DSN.2016.29,  2016.  [ pdf ]
  40.  Saurabh Gadia,  Cyrille Artho,  Gedare Bloom,    Verifying Nested Lock Priority Inheritance in RTEMS with Java Pathfinder,  in Formal Methods and Software Engineering,  pp. 417-432,  Springer, Cham,DOI: 10.1007/978-3-319-47846-3_26,  2016.  [ pdf ]

  41.  Daniel Cederman,  Daniel Hellström,  Joel Sherrill,  Gedare Bloom,  Mathieu Patte,  Marco Zulianello,    RTEMS SMP and MTAPI for Efficient Multi-Core Space Applications on LEON3/LEON4 Processors,  in Data Systems In Aerospace,  2015.  [ pdf ]
  42.  G. Bloom,  B. Narahari,  R. Simha,  A. Namazi,  R. Levy,    FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets,  in 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST),  pp. 48-51,DOI: 10.1109/HST.2015.7140235,  2015.  [ pdf ]
  43.  Hermann Felbinger,  Joel Sherrill,  Gedare Bloom,  Franz Wotawa,    Test Suite Coverage Measurement and Reporting for Testing an Operating System without Instrumentation,  in 17th Real Time Linux Workshop,  2015.  [ pdf ]

  44.  Eric Armbrust,  Jiguo Song,  Gedare Bloom,  Gabriel Parmer,    On Spatial Isolation for Mixed Criticality, Embedded Systems,  in Proc. 2nd Workshop on Mixed Criticality Systems (WMC), RTSS,  pp. 15-20,  2014.  [ pdf ]
  45.  Gedare Bloom,  Rahul Simha,    Hardware-enhanced Distributed Access Enforcement for Role-based Access Control,  in Proceedings of the 19th ACM Symposium on Access Control Models and Technologies,  pp. 5-16,  ACM,DOI: 10.1145/2613087.2613096,  2014.  [ pdf ]
  46.  Daniel Cederman,  Daniel Hellström,  Joel Sherrill,  Gedare Bloom,  Mathieu Patte,  Marco Zulianello,    RTEMS SMP for LEON3/LEON4 Multi-Processor Devices,  in Data Systems In Aerospace,  2014.  [ pdf ]

  47.  Scotty Smith,  Gedare Bloom,  Rahul Simha,    PyLOM: A Language and Run-time System for Planning Applications,  in Proceedings of the 2013 Companion Publication for Conference on Systems, Programming, & Applications: Software for Humanity,  pp. 91-92,  ACM,DOI: 10.1145/2508075.2522608,  2013.  [ pdf ]
  48.  Eugen Leontie,  Gedare Bloom,  Rahul Simha,    Hardware and Software Support for Fine-grained Memory Access Control and Encapsulation in C++,  in Proceedings of the 2013 Companion Publication for Conference on Systems, Programming, & Applications: Software for Humanity,  pp. 81-82,  ACM,DOI: 10.1145/2508075.2508091,  2013.  [ pdf ]

  49.  E. Leontie,  G. Bloom,  B. Narahari,  R. Simha,    No Principal Too Small: Memory Access Control for Fine-Grained Protection Domains,  in 2012 15th Euromicro Conference on Digital System Design (DSD),  pp. 163-170,DOI: 10.1109/DSD.2012.89,  2012.  [ pdf ]
  50.  Gedare Bloom,  Gabriel Parmer,  Bhagirath Narahari,  Rahul Simha,    Shared hardware data structures for hard real-time systems,  in Proceedings of the tenth ACM international conference on Embedded software,  pp. 133-142,  ACM,DOI: 10.1145/2380356.2380382,  2012.  [ pdf ]

  51.  E. Leontie,  G. Bloom,  R. Simha,    Automation for creating and configuring security manifests for hardware containers,  in 2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG),  pp. 1-2,  IEEE,DOI: 10.1109/SafeConfig.2011.6111677,  2011.  [ pdf ]

  52.  Gedare Bloom,  Bhagirath Narahari,  Rahul Simha,    Fab Forensics: Increasing Trust in IC Fabrication,  in 2010 IEEE International Conference on Technologies for Homeland Security,  2010.  [ pdf ]
  53.  Gedare Bloom,  Gabriel Parmer,  Bhagirath Narahari,  Rahul Simha,    Real-Time Scheduling with Hardware Data Structures,  in Work-in-Progress Session. IEEE Real-Time Systems Symposium,  2010.  [ pdf ]

  54.  Gedare Bloom,  Bhagirath Narahari,  Rahul Simha,    OS support for detecting Trojan circuit attacks,  in Hardware-Oriented Security and Trust, IEEE International Workshop on,  pp. 100-103,  IEEE Computer Society,DOI: 10.1109/HST.2009.5224959,  2009.  [ pdf ]
  55.  Eugen Leontie,  Gedare Bloom,  Bhagirath Narahari,  Rahul Simha,  Joseph Zambreno,    Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems,  in Computational Science and Engineering, IEEE International Conference on,  vol. 2,  pp. 830-836,  IEEE Computer Society,DOI: http://doi.ieeecomputersociety.org/10.1109/CSE.2009.56,  2009.  [ pdf ]
  56.  Eugen Leontie,  Gedare Bloom,  Bhagirath Narahari,  Rahul Simha,  Joseph Zambreno,    Hardware-enforced fine-grained isolation of untrusted code,  in Proceedings of the first ACM workshop on Secure execution of untrusted code,  pp. 11-18,  ACM,DOI: 10.1145/1655077.1655082,  2009.  [ pdf ]
  57.  Gedare Bloom,  Stefan Popoveniuc,    Information Leakage in Mix Networks with Randomized Partial Checking,  in International Conference on Information Security and Privacy,  2009.  [ pdf ]

Notice

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.