Enjoy your visit to my website.
Book Chapters
Invited Contributions
  • Rosario Cammarota, Indranil Banerjee and Ofer Rosenberg. Machine Learning IP Protection. ICCAD 2018.
  • Sandip Ray, Wen Chen and rosario Cammarota. Protecting the supply chain for automotives and IoTs. DAC 2018.
  • Rosario Cammarota, Naghmeh Karimi, Sidd Garg and JV Rajendran. Recent Developments in Hardware Security. IEEE VTS 2018.

Conference Articles
  • Cammarota R., Sheikh R. " VPsec: Countering Fault Attacks in General Purpose Microprocessors with Value Prediction. "  in Proceedings of ACM International Conference on Computing Frontiers 2018.
  • Sheikh R., Cammarota R.,  and Ruan W. " Value Prediction for Security (VPsec):  Countering Fault Attacks in Modern Microprocessors . " short contribution in Proceedings of International Symposium on Hardware Oriented Security and Trust (HOST), 2018 ( Best Short Contribution. )
  • Chen Z., Shen J., Nicolau A., Veidenbaum A., Ghalaty N., and Cammarota R. " CAMFAS: A Compiler Approach to Mitigate Fault Attacks via Enhanced SIMDization . " International Workshop on Fault Tolerance and Diagnosis in Cryptography (FDTC), 2017
  • Nejatollahi H., Dutt N., Cammarota R. " Trends, Challenges and Needs for Lattice-Based Cryptography Implementations. " Special Session: CODES+ISSS 2017
  • Taheri S., Beni L., Cammarota R., Veidenbaum A., Nicolau A., Qiu J., Lu Q. and Haghighat M. WebRTCBench: A Benchmark for Performance Assessment of WebRTC Implementations. In Proceedings of 13th IEEE Symposium on Embedded Systems and Real-time Multimedia, 2015
  • Lugo J. G., Cammarota R., Lopez S. R., Avila A., Dutt N. Characterization of GPGPU Workloads via Correlation-Driven Kernel Similarity Analysis. In Proceedings of IEEE International Conference on Mechatronics, Electronics and Automotive Engineering, 2013
  • Cammarota, R., Aghababaie Beni, L., Nicolau, A., Veidenbaum, A. V. Effective performance evaluation of multi-core based systems. In Proceedings of the IEEE International Symposium on Parallel and Distributed Computing, 2013
  • Duong N., Zhao D., Kim T., Cammarota R., Veidenbaum A. and Valero M.  Improving Cache Management Policies Using Dynamic Reuse Distances. In Proceedings of 45th Annual IEEE/ACM International Symposium on Microarchitecture, 2012
  • Wang, Y., Nicolau, A., Cammarota R., Veidenbaum, A. A Fault Tolerant Self-scheduling Scheme for Parallel Loops on Shared Memory Systems. In Proceedings of the IEEE International Conference on High Performance Computing, 2012
  • Cammarota R., Kejariwal A., Donato D., Nicolau A., Veidenbaum A. Selective Search of Inlining Vectors for Program Optimization. In Proceedings of ACM International Conference on Computing Frontiers, 2012
  • Cammarota R., Kejariwal A., D’Alberto P., Panigrahi S., Nicolau A., Veidenbaum A. Pruning Hardware Evaluation Space via Correlation-Driven Application Similarity Analysis. In Proceedings of ACM International Conference on Computing Frontiers, 2011
  • Shivam A., Ravi P., Nicolau A., Veidenbaum A., Cammarota R. Load Balancing of Polygonal Partitions. to appear in International Workshop on Polyhedral Compilation Techniques (IMPACT), 2018
  • Lugo J. G., Cammarota R., Avila A., Dutt N. A New Characterization Approach to Model GPGPU Applications and Derive Hints for Their Optimization. Compiler, Architecture and Tools Conference at Intel Development Center (IDC9), 2013
  • Verdoscia L., Cammarota R., Vaccaro R. A New Computational Model and Microprocessor Architecture: A Way to Scale Program Performance in the Next Decade. ScalPerf 2012
  • Cammarota R., Kejariwal A., D’Alberto P., Nicolau A., Veidenbaum A. Performance Modeling for System Selection. In Proceedings of the 16th International Workshop on Compilers for Parallel Computing, 2012
  • Duong N., Cammarota R., Zhao D., Kim T., Veidenbaum A. SCORE: A Score-Based Memory Cache Replacement Policy. In Proceedings of the 1st JILP Workshop on Computer Architecture Competitions: Cache Replacement Championship, 2010

  • Rami Sheikh and Rosario Cammarota. Improving Performance and Mitigating Fault Attacks Using Value Prediction. MDPI Cryptography, Vol. 2, 2018
  • Wang Y., Cammarota R. and Nicolau A. Fault Tolerant Scheduling for Parallel Loops on Shared Memory Systems. Journal of Information Science and Engineering 31(6): 1937-1959, 2015

Technical Reports
  • Nejatollahi H., Dutt N., Banerjee I., Ray S., Regazzoni F., Cammarota R. “Implementations of Lattice Based Cryptography: A survey.” UCI-TR-17-04, April 2017.
  • Cammarota R., Veidenbaum A. V. “Metrology Applied to Performance Analysis Using Hardware Counters.” UCI-TR-10-01, Mar 2010.