


default search action
SEED 2022: Storrs, CT, USA
- 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), Storrs, CT, USA, September 26-27, 2022. IEEE 2022, ISBN 978-1-6654-8526-5
- Yashika Verma, Biswabandan Panda:
Avenger: Punishing the Cross-Core Last-Level Cache Attacker and Not the Victim by Isolating the Attacker. 1-12 - Thomas Unterluggauer, Austin Harris
, Scott Constable, Fangfei Liu, Carlos V. Rozas:
Chameleon Cache: Approximating Fully Associative Caches with Random Replacement to Prevent Contention-Based Cache Attacks. 13-24 - Minjun Wu, Stephen McCamant, Pen-Chung Yew
, Antonia Zhai:
PREDATOR: A Cache Side-Channel Attack Detector Based on Precise Event Monitoring. 25-36 - Tarunesh Verma, Achilleas Anastasopoulos, Todd M. Austin:
These Aren't The Caches You're Looking For: Stochastic Channels on Randomized Caches. 37-48 - Pavlos Aimoniotis
, Amund Bergland Kvalsvik, Magnus Själander
, Stefanos Kaxiras:
Data-Out Instruction-In (DOIN!): Leveraging Inclusive Caches to Attack Speculative Delay Schemes. 49-60 - Kaustubh Shivdikar, Gilbert Jonatan, Evelio Mora, Neal Livesay, Rashmi Agrawal, Ajay Joshi, José L. Abellán, John Kim, David R. Kaeli:
Accelerating Polynomial Multiplication for Homomorphic Encryption on GPUs. 61-72 - Lauren Biernacki
, Meron Zerihun Demissie
, Kidus Birkayehu Workneh, Fitsum Assamnew Andargie
, Todd M. Austin:
Sequestered Encryption: A Hardware Technique for Comprehensive Data Privacy. 73-84 - Alvin Oliver Glova, Yukai Yang, Yiyao Wan, Zhizhou Zhang
, George Michelogiannakis
, Jonathan Balkind, Timothy Sherwood
:
Establishing Cooperative Computation with Hardware Embassies. 85-96 - Kailash Gogineni, Preet Derasari
, Guru Venkataramani:
Foreseer: Efficiently Forecasting Malware Event Series with Long Short-Term Memory. 97-108 - Roberto Guanciale, Nicolae Paladi, Arash Vahidi:
SoK: Confidential Quartet - Comparison of Platforms for Virtualization-Based Confidential Computing. 109-120 - Ayaz Akram, Venkatesh Akella, Sean Peisert
, Jason Lowe-Power
:
SoK: Limitations of Confidential Computing via TEEs for High-Performance Compute Systems. 121-132 - Jiyong Yu
, Xinyang Ge, Trent Jaeger, Christopher W. Fletcher, Weidong Cui:
Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory. 133-144 - Jiuqin Zhou, Yuan Xiao, Radu Teodorescu, Yinqian Zhang:
ENCLYZER: Automated Analysis of Transient Data Leaks on Intel SGX. 145-156 - Derrick Greenspan, Naveed Ul Mustafa
, Zoran Kolega, Mark A. Heinrich, Yan Solihin:
Improving the Security and Programmability of Persistent Memory Objects. 157-168 - Casey Nelson, Joseph Izraelevitz, R. Iris Bahar
, Tamara Silbergleit Lehman:
Eliminating Micro-Architectural Side-Channel Attacks using Near Memory Processing. 179-189 - Usman Ali
, Abdul Rasheed Sahni, Omer Khan:
Protecting On-Chip Data Access Against Timing-Based Side-Channel Attacks on Multicores. 190-201 - Jacob Abraham, Alan Ehret, Michel A. Kinsy:
A Compiler for Transparent Namespace-Based Access Control for the Zeno Architecture. 1-10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.