Search dblp for Publications

export results for "stream:conf/hasp:"

 download as .bib file

@inproceedings{DBLP:conf/hasp/AsgharBZ24,
  author       = {Ali Asghar and
                  Andreas Becher and
                  Daniel Ziener},
  title        = {Short Paper: Analysis of Vivado implementation strategies regarding
                  side-channel leakage for FPGA-based {AES} implementations},
  booktitle    = {Proceedings of the 13th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2024, Austin, TX, USA, 2
                  November 2024},
  pages        = {45--49},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3696843.3696853},
  doi          = {10.1145/3696843.3696853},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/AsgharBZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/CathisLWOTG24,
  author       = {Alexander Cathis and
                  Ge Li and
                  Shijia Wei and
                  Michael Orshansky and
                  Mohit Tiwari and
                  Andreas Gerstlauer},
  title        = {SoK Paper: Power Side-Channel Malware Detection},
  booktitle    = {Proceedings of the 13th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2024, Austin, TX, USA, 2
                  November 2024},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3696843.3696849},
  doi          = {10.1145/3696843.3696849},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/CathisLWOTG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/KaranjaiSXFCZSS24,
  author       = {Rabimba Karanjai and
                  Sangwon Shin and
                  Wujie Xiong and
                  Xinxin Fan and
                  Lin Chen and
                  Tianwei Zhang and
                  Taeweon Suh and
                  Weidong Shi and
                  Veronika Kuchta and
                  Francesco Sica and
                  Lei Xu},
  title        = {{TPU} as Cryptographic Accelerator},
  booktitle    = {Proceedings of the 13th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2024, Austin, TX, USA, 2
                  November 2024},
  pages        = {37--44},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3696843.3696844},
  doi          = {10.1145/3696843.3696844},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/KaranjaiSXFCZSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/KunduG24,
  author       = {Satwik Kundu and
                  Swaroop Ghosh},
  title        = {SoK Paper: Security Concerns in Quantum Machine Learning as a Service},
  booktitle    = {Proceedings of the 13th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2024, Austin, TX, USA, 2
                  November 2024},
  pages        = {28--36},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3696843.3696846},
  doi          = {10.1145/3696843.3696846},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/KunduG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/NamboothiryDDL24,
  author       = {Bharath Namboothiry and
                  David Durham and
                  Christoph Dobraunig and
                  Michael LeMay},
  title        = {Cryptographic Memory Tagging: Towards Stateless Integrity},
  booktitle    = {Proceedings of the 13th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2024, Austin, TX, USA, 2
                  November 2024},
  pages        = {50--58},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3696843.3696845},
  doi          = {10.1145/3696843.3696845},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/NamboothiryDDL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/Woralert0B24,
  author       = {Chutitep Woralert and
                  Chen Liu and
                  Zander Blasingame},
  title        = {Towards Effective Machine Learning Models for Ransomware Detection
                  via Low-Level Hardware Information},
  booktitle    = {Proceedings of the 13th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2024, Austin, TX, USA, 2
                  November 2024},
  pages        = {10--18},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3696843.3696847},
  doi          = {10.1145/3696843.3696847},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/Woralert0B24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/YeKDFPFRBC24,
  author       = {Mengmei Ye and
                  Sandhya Koteshwara and
                  Derren Dunn and
                  Hubertus Franke and
                  Chris Porter and
                  Tobin Feldman{-}Fitzthum and
                  Angelo Ruocco and
                  Daniele Buono and
                  Cl{\'{a}}udio Carvalho},
  title        = {Position Paper: From Confidential Computing to Zero Trust, Come Along
                  for the (Bumpy?) Ride},
  booktitle    = {Proceedings of the 13th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2024, Austin, TX, USA, 2
                  November 2024},
  pages        = {19--27},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3696843.3696848},
  doi          = {10.1145/3696843.3696848},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/YeKDFPFRBC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hasp/2024,
  title        = {Proceedings of the 13th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2024, Austin, TX, USA, 2
                  November 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3696843},
  doi          = {10.1145/3696843},
  isbn         = {979-8-4007-1221-0},
  timestamp    = {Thu, 31 Oct 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/2024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/0002KAHJ23,
  author       = {Karthik Ganesan and
                  Viktor Karyofyllis and
                  Julianne Attai and
                  Ahmed Hamoda and
                  Natalie Enright Jerger},
  title        = {{DINAR:} Enabling Distribution Agnostic Noise Injection in Machine
                  Learning Hardware},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {38--46},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623665},
  doi          = {10.1145/3623652.3623665},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/0002KAHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/Banerjee23,
  author       = {Sarbartha Banerjee},
  title        = {Triton: Software-Defined Threat Model for Secure Multi-Tenant {ML}
                  Inference Accelerators},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {19--28},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623672},
  doi          = {10.1145/3623652.3623672},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/Banerjee23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/BrunHOS23,
  author       = {L{\'{e}}lio Brun and
                  Ichiro Hasuo and
                  Yasushi Ono and
                  Taro Sekiyama},
  title        = {Automated Security Analysis for Real-World IoT Devices},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {29--37},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623667},
  doi          = {10.1145/3623652.3623667},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/BrunHOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/ChiuX23,
  author       = {Tinghung Chiu and
                  Wenjie Xiong},
  title        = {SoK: Fault Injection Attacks on Cryptosystems},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {64--72},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623671},
  doi          = {10.1145/3623652.3623671},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/ChiuX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/Das23,
  author       = {Subrata Das},
  title        = {SoK: {A} First Order Survey of Quantum Supply Dynamics and Threat
                  Landscapes},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {82--90},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623664},
  doi          = {10.1145/3623652.3623664},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/Das23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/ForcioliDC23,
  author       = {Quentin Forcioli and
                  Jean{-}Luc Danger and
                  Sumanta Chaudhuri},
  title        = {A gem5 based Platform for Micro-Architectural Security Analysis},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {91--99},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623674},
  doi          = {10.1145/3623652.3623674},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/ForcioliDC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/LalAJ23,
  author       = {Reshma Lal and
                  James B. Anderson and
                  Andrew Jackson},
  title        = {Data Processing Unit's Entry into Confidential Computing},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {56--63},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623670},
  doi          = {10.1145/3623652.3623670},
  timestamp    = {Wed, 26 Feb 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/LalAJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/LiuR023,
  author       = {William Liu and
                  Joseph Ravichandran and
                  Mengjia Yan},
  title        = {EntryBleed: {A} Universal {KASLR} Bypass against {KPTI} on Linux},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {10--18},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623669},
  doi          = {10.1145/3623652.3623669},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/LiuR023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/OrieroKS23,
  author       = {Enahoro Oriero and
                  Faiq Khalid and
                  Syed Rafay Hasan},
  title        = {DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {47--55},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623673},
  doi          = {10.1145/3623652.3623673},
  timestamp    = {Sat, 27 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/OrieroKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/Ozga23,
  author       = {Wojciech Ozga},
  title        = {Towards a Formally Verified Security Monitor for VM-based Confidential
                  Computing},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {73--81},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623668},
  doi          = {10.1145/3623652.3623668},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/Ozga23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/RyanGS23,
  author       = {Kaki Ryan and
                  Matthew Gregoire and
                  Cynthia Sturton},
  title        = {{SEIF:} Augmented Symbolic Execution for Information Flow in Hardware
                  Designs},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623666},
  doi          = {10.1145/3623652.3623666},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/RyanGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hasp/2023,
  title        = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652},
  doi          = {10.1145/3623652},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/BiringaBK22,
  author       = {Chidera Biringa and
                  Gaspard Baye and
                  G{\"{o}}khan Kul},
  title        = {Short Paper: Static and Microarchitectural ML-Based Approaches For
                  Detecting Spectre Vulnerabilities and Attacks},
  booktitle    = {Proceedings of the 11th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1
                  October 2022},
  pages        = {53--57},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569562.3569589},
  doi          = {10.1145/3569562.3569589},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/BiringaBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/Bisheh-NiasarAA22,
  author       = {Mojtaba Bisheh{-}Niasar and
                  Mila Anastasova and
                  Abubakr Abdulgadir and
                  Hwajeong Seo and
                  Reza Azarderakhsh},
  title        = {Side-Channel Analysis and Countermeasure Design for Implementation
                  of Curve448 on Cortex-M4},
  booktitle    = {Proceedings of the 11th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1
                  October 2022},
  pages        = {10--17},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569562.3569564},
  doi          = {10.1145/3569562.3569564},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hasp/Bisheh-NiasarAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/ChenAK22,
  author       = {Xiaoyue Chen and
                  Pavlos Aimoniotis and
                  Stefanos Kaxiras},
  title        = {Clueless: {A} Tool Characterising Values Leaking as Addresses},
  booktitle    = {Proceedings of the 11th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1
                  October 2022},
  pages        = {27--34},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569562.3569566},
  doi          = {10.1145/3569562.3569566},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hasp/ChenAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/KucukMMMA22,
  author       = {Kubilay Ahmet K{\"{u}}{\c{c}}{\"{u}}k and
                  Steve Moyle and
                  Andrew Martin and
                  Alexandru Mereacre and
                  Nicholas Allott},
  title        = {SoK: How Not to Architect Your Next-Generation {TEE} Malware?},
  booktitle    = {Proceedings of the 11th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1
                  October 2022},
  pages        = {35--44},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569562.3569568},
  doi          = {10.1145/3569562.3569568},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/KucukMMMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/Naseredini0SX22,
  author       = {Amir Naseredini and
                  Martin Berger and
                  Matteo Sammartino and
                  Shale Xiong},
  title        = {{ALARM:} Active LeArning of Rowhammer Mitigations},
  booktitle    = {Proceedings of the 11th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1
                  October 2022},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569562.3569563},
  doi          = {10.1145/3569562.3569563},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/Naseredini0SX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/SchillingNUM22,
  author       = {Robert Schilling and
                  Pascal Nasahl and
                  Martin Unterguggenberger and
                  Stefan Mangard},
  title        = {{SFP:} Providing System Call Flow Protection against Software and
                  Fault Attacks},
  booktitle    = {Proceedings of the 11th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1
                  October 2022},
  pages        = {18--26},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569562.3569565},
  doi          = {10.1145/3569562.3569565},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/SchillingNUM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/UpadhyayG22,
  author       = {Suryansh Upadhyay and
                  Swaroop Ghosh},
  title        = {Robust and Secure Hybrid Quantum-Classical Computation on Untrusted
                  Cloud-Based Quantum Hardware},
  booktitle    = {Proceedings of the 11th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1
                  October 2022},
  pages        = {45--52},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569562.3569569},
  doi          = {10.1145/3569562.3569569},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/UpadhyayG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hasp/2022,
  title        = {Proceedings of the 11th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1
                  October 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569562},
  doi          = {10.1145/3569562},
  isbn         = {978-1-4503-9871-8},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hasp/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/0004JL21,
  author       = {Tianwei Zhang and
                  Jakub Szefer and
                  Ruby B. Lee},
  title        = {Practical and Scalable Security Verification of Secure Architectures},
  booktitle    = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  pages        = {2:1--2:9},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253.3505256},
  doi          = {10.1145/3505253.3505256},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/0004JL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/ChoudhuryTF21,
  author       = {Muhtadi Choudhury and
                  Shahin Tajik and
                  Domenic Forte},
  title        = {{SPARSE:} Spatially Aware {LFI} Resilient State Machine Encoding},
  booktitle    = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253.3505254},
  doi          = {10.1145/3505253.3505254},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/ChoudhuryTF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/LiDS21,
  author       = {Allen Mi and
                  Shuwen Deng and
                  Jakub Szefer},
  title        = {Short Paper: Device- and Locality-Specific Fingerprinting of Shared
                  {NISQ} Quantum Computers},
  booktitle    = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  pages        = {7:1--7:6},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253.3505261},
  doi          = {10.1145/3505253.3505261},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/LiDS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/LiHRLNCZ21,
  author       = {Haonan Li and
                  Weijie Huang and
                  Mingde Ren and
                  Hongyi Lu and
                  Zhenyu Ning and
                  Heming Cui and
                  Fengwei Zhang},
  title        = {A Novel Memory Management for {RISC-V} Enclaves},
  booktitle    = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  pages        = {3:1--3:9},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253.3505257},
  doi          = {10.1145/3505253.3505257},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/LiHRLNCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/MohammedKSCH21,
  author       = {Hawzhin Mohammed and
                  Faiq Khalid and
                  Paul Sawyer and
                  Gabriella Cataloni and
                  Syed Rafay Hasan},
  title        = {InTrust-IoT: Intelligent Ecosystem based on Power Profiling of Trusted
                  device(s) in IoT for Hardware Trojan Detection},
  booktitle    = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  pages        = {8:1--8:8},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253.3505262},
  doi          = {10.1145/3505253.3505262},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/MohammedKSCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/ShiXCZG21,
  author       = {Rabimba Karanjai and
                  Weidong Shi and
                  Lei Xu and
                  Lin Chen and
                  Fengwei Zhang and
                  Zhimin Gao},
  title        = {Lessons Learned from Blockchain Applications of Trusted Execution
                  Environments and Implications for Future Research},
  booktitle    = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  pages        = {5:1--5:8},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253.3505259},
  doi          = {10.1145/3505253.3505259},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/ShiXCZG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/SureshAATG21,
  author       = {Aakarshitha Suresh and
                  Abdullah Ash{-}Saki and
                  Mahababul Alam and
                  Rasit Onur Topaloglu and
                  Swaroop Ghosh},
  title        = {Short Paper: {A} Quantum Circuit Obfuscation Methodology for Security
                  and Privacy},
  booktitle    = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  pages        = {6:1--6:5},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253.3505260},
  doi          = {10.1145/3505253.3505260},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/SureshAATG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/YoshidaSF21,
  author       = {Kota Yoshida and
                  Kuniyasu Suzaki and
                  Takeshi Fujino},
  title        = {Towards Trusted IoT Sensing Systems: Implementing {PUF} as Secure
                  Key Generator for Root of Trust and Message Authentication Code},
  booktitle    = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253.3505258},
  doi          = {10.1145/3505253.3505258},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/YoshidaSF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/micro/2021hasp,
  title        = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253},
  doi          = {10.1145/3505253},
  isbn         = {978-1-4503-9614-1},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/2021hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/DangwalCALRT20,
  author       = {Deeksha Dangwal and
                  Meghan Cowan and
                  Armin Alaghi and
                  Vincent T. Lee and
                  Brandon Reagen and
                  Caroline Trippel},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {SoK: Opportunities for Software-Hardware-Security Codesign for Next
                  Generation Secure Computing},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {8:1--8:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458911},
  doi          = {10.1145/3458903.3458911},
  timestamp    = {Tue, 26 Oct 2021 15:43:33 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/DangwalCALRT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/DelgadoVK20,
  author       = {Brian Delgado and
                  Tejaswini Vibhute and
                  Karen L. Karavanic},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Applying the Principle of Least Privilege to System Management Interrupt
                  Handlers with the Intel {SMI} Transfer Monitor},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {4:1--4:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458907},
  doi          = {10.1145/3458903.3458907},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/DelgadoVK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/Hu0L20,
  author       = {Guangyuan Hu and
                  Tianwei Zhang and
                  Ruby B. Lee},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {6:1--6:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458909},
  doi          = {10.1145/3458903.3458909},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/Hu0L20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/Koteshwara0P20,
  author       = {Sandhya Koteshwara and
                  Manoj Kumar and
                  Pratap Pattnaik},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Analysis and Hardware Optimization of Lattice Post-Quantum Cryptography
                  Workloads},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {2:1--2:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458905},
  doi          = {10.1145/3458903.3458905},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/Koteshwara0P20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/MarkettosBBNMW20,
  author       = {A. Theodore Markettos and
                  John Baldwin and
                  Ruslan Bukin and
                  Peter G. Neumann and
                  Simon W. Moore and
                  Robert N. M. Watson},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Position Paper: Defending Direct Memory Access with {CHERI} Capabilities},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {7:1--7:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458910},
  doi          = {10.1145/3458903.3458910},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/MarkettosBBNMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/MarshallPP20,
  author       = {Ben Marshall and
                  Daniel Page and
                  Thinh Hung Pham},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Implementing the Draft {RISC-V} Scalar Cryptography Extensions},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458904},
  doi          = {10.1145/3458903.3458904},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/MarshallPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/MoraitisD20,
  author       = {Michail Moraitis and
                  Elena Dubrova},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {{FPGA} Bitstream Modification with Interconnect in Mind},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {5:1--5:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458908},
  doi          = {10.1145/3458903.3458908},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/MoraitisD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/StrupeK20,
  author       = {Fredrik Strupe and
                  Rakesh Kumar},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Uncovering Hidden Instructions in Armv8-A Implementations},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {3:1--3:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458906},
  doi          = {10.1145/3458903.3458906},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/StrupeK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/micro/2020hasp,
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903},
  doi          = {10.1145/3458903},
  isbn         = {978-1-4503-8898-6},
  timestamp    = {Tue, 26 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/2020hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/0056019,
  author       = {Xin Wang and
                  Wei Zhang},
  title        = {Cracking Randomized Coalescing Techniques with An Efficient Profiling-Based
                  Side-Channel Attack to {GPU}},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {2:1--2:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337169},
  doi          = {10.1145/3337167.3337169},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/0056019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ChakrabartiHKV19,
  author       = {Somnath Chakrabarti and
                  Matthew Hoekstra and
                  Dmitrii Kuvaiskii and
                  Mona Vij},
  title        = {Scaling Intel{\textregistered} Software Guard Extensions Applications
                  with Intel{\textregistered} {SGX} Card},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {6:1--6:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337173},
  doi          = {10.1145/3337167.3337173},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ChakrabartiHKV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/DengG0SGLDS19,
  author       = {Shuwen Deng and
                  Doguhan G{\"{u}}m{\"{u}}soglu and
                  Wenjie Xiong and
                  Sercan Sari and
                  Y. Serhan Gener and
                  Corine Lu and
                  Onur Demir and
                  Jakub Szefer},
  title        = {SecChisel Framework for Security Verification of Secure Processor
                  Architectures},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {7:1--7:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337174},
  doi          = {10.1145/3337167.3337174},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/DengG0SGLDS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/DisselkoenRWGLS19,
  author       = {Craig Disselkoen and
                  John Renner and
                  Conrad Watt and
                  Tal Garfinkel and
                  Amit Levy and
                  Deian Stefan},
  title        = {Position Paper: Progressive Memory Safety for WebAssembly},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337171},
  doi          = {10.1145/3337167.3337171},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/DisselkoenRWGLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ShanbhogueGS19,
  author       = {Vedvyas Shanbhogue and
                  Deepak Gupta and
                  Ravi Sahita},
  title        = {Security Analysis of Processor Instruction Set Architecture for Enforcing
                  Control-Flow Integrity},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {8:1--8:11},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337175},
  doi          = {10.1145/3337167.3337175},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ShanbhogueGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ShimizuTJP19,
  author       = {Atsuko Shimizu and
                  Daniel Townley and
                  Mohit Joshi and
                  Dmitry Ponomarev},
  title        = {{EA-PLRU:} Enclave-Aware Cache Replacement},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {5:1--5:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337172},
  doi          = {10.1145/3337167.3337172},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ShimizuTJP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/TMPD19,
  author       = {Santhosh Kumar T and
                  Debadatta Mishra and
                  Biswabandan Panda and
                  Nayan Deshmukh},
  title        = {CoWLight: Hardware Assisted Copy-on-Write Fault Handling for Secure
                  Deduplication},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {3:1--3:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337170},
  doi          = {10.1145/3337167.3337170},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/TMPD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/TorresYBBL19,
  author       = {Gildo Torres and
                  Zhiliu Yang and
                  Zander Blasingame and
                  James Bruska and
                  Chen Liu},
  title        = {Detecting Non-Control-Flow Hijacking Attacks Using Contextual Execution
                  Information},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337168},
  doi          = {10.1145/3337167.3337168},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/TorresYBBL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2019hasp,
  title        = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167},
  doi          = {10.1145/3337167},
  isbn         = {978-1-4503-7226-8},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/2019hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/DengXS18,
  author       = {Shuwen Deng and
                  Wenjie Xiong and
                  Jakub Szefer},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Cache timing side-channel vulnerability checking with computation
                  tree logic},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {2:1--2:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214294},
  doi          = {10.1145/3214292.3214294},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/DengXS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/DongSCCD18,
  author       = {Xiaowan Dong and
                  Zhuojia Shen and
                  John Criswell and
                  Alan L. Cox and
                  Sandhya Dwarkadas},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Spectres, virtual ghosts, and hardware support},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {5:1--5:9},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214297},
  doi          = {10.1145/3214292.3214297},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/DongSCCD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/KhanG18,
  author       = {Mohammad Nasim Imtiaz Khan and
                  Swaroop Ghosh},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Fault injection attacks on emerging non-volatile memory and countermeasures},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {10:1--10:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214302},
  doi          = {10.1145/3214292.3214302},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/KhanG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/Lowe-PowerAFKN18,
  author       = {Jason Lowe{-}Power and
                  Venkatesh Akella and
                  Matthew K. Farrens and
                  Samuel T. King and
                  Christopher J. Nitta},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {A case for exposing extra-architectural state in the {ISA:} position
                  paper},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {8:1--8:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214300},
  doi          = {10.1145/3214292.3214300},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/Lowe-PowerAFKN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/MofradZLS18,
  author       = {Saeid Mofrad and
                  Fengwei Zhang and
                  Shiyong Lu and
                  Weidong Shi},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {A comparison study of intel {SGX} and {AMD} memory encryption technology},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {9:1--9:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214301},
  doi          = {10.1145/3214292.3214301},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/MofradZLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/MushtaqABCLG18,
  author       = {Maria Mushtaq and
                  Ayaz Akram and
                  Muhammad Khurram Bhatti and
                  Maham Chaudhry and
                  Vianney Lapotre and
                  Guy Gogniat},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {NIGHTs-WATCH: a cache-based side-channel intrusion detector using
                  hardware performance counters},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214293},
  doi          = {10.1145/3214292.3214293},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/MushtaqABCLG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/PetersLVPK18,
  author       = {Travis Peters and
                  Reshma Lal and
                  Srikanth Varadarajan and
                  Pradeep Pappachan and
                  David Kotz},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {{BASTION-SGX:} bluetooth and architectural support for trusted {I/O}
                  on {SGX}},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {3:1--3:9},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214295},
  doi          = {10.1145/3214292.3214295},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/PetersLVPK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/VigLBM18,
  author       = {Saru Vig and
                  Siew{-}Kei Lam and
                  Sarani Bhattacharya and
                  Debdeep Mukhopadhyay},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Rapid detection of rowhammer attacks using dynamic skewed hash tree},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {7:1--7:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214299},
  doi          = {10.1145/3214292.3214299},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/VigLBM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/VuongSTB18,
  author       = {Andrew Vuong and
                  Ali Shafiee and
                  Meysam Taassori and
                  Rajeev Balasubramonian},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {An MLP-aware leakage-free memory controller},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {4:1--4:7},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214296},
  doi          = {10.1145/3214292.3214296},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/VuongSTB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/WongHC18,
  author       = {Ming Ming Wong and
                  Jawad Haj{-}Yahya and
                  Anupam Chattopadhyay},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {{SMARTS:} secure memory assurance of {RISC-V} trusted SoC},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {6:1--6:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214298},
  doi          = {10.1145/3214292.3214298},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/WongHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2018hasp,
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292},
  doi          = {10.1145/3214292},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/2018hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/AriasSJ17,
  author       = {Orlando Arias and
                  Dean Sullivan and
                  Yier Jin},
  title        = {HA2lloc: Hardware-Assisted Secure Allocator},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {8:1--8:7},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092635},
  doi          = {10.1145/3092627.3092635},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/AriasSJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ChakrabartiLVMR17,
  author       = {Somnath Chakrabarti and
                  Rebekah Leslie{-}Hurd and
                  Mona Vij and
                  Frank McKeen and
                  Carlos V. Rozas and
                  Dror Caspi and
                  Ilya Alexandrovich and
                  Ittai Anati},
  title        = {Intel{\textregistered} Software Guard Extensions (Intel{\textregistered}
                  {SGX)} Architecture for Oversubscription of Secure Memory in a Virtualized
                  Environment},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {7:1--7:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092634},
  doi          = {10.1145/3092627.3092634},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/ChakrabartiLVMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/GhoshMZS17,
  author       = {Santosh Ghosh and
                  Rafael Misoczki and
                  Li Zhao and
                  Manoj R. Sastry},
  title        = {Lightweight Block Cipher Circuits for Automotive and IoT Sensor Devices},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {5:1--5:7},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092632},
  doi          = {10.1145/3092627.3092632},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/GhoshMZS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/MenonMRGV17,
  author       = {Arjun Menon and
                  Subadra Murugan and
                  Chester Rebeiro and
                  Neel Gala and
                  Kamakoti Veezhinathan},
  title        = {Shakti-T: {A} {RISC-V} Processor with Light Weight Security Extensions},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {2:1--2:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092629},
  doi          = {10.1145/3092627.3092629},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/MenonMRGV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/NingZSS17,
  author       = {Zhenyu Ning and
                  Fengwei Zhang and
                  Weisong Shi and
                  Weidong Shi},
  title        = {Position Paper: Challenges Towards Securing Hardware-assisted Execution
                  Environments},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {6:1--6:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092633},
  doi          = {10.1145/3092627.3092633},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/NingZSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ShwartzB17,
  author       = {Ofir Shwartz and
                  Yitzhak Birk},
  title        = {SeM: {A} {CPU} Architecture Extension for Secure Remote Computing},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092631},
  doi          = {10.1145/3092627.3092631},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/ShwartzB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/YuK17,
  author       = {Weize Yu and
                  Sel{\c{c}}uk K{\"{o}}se},
  title        = {A Lightweight {AES} Implementation Against Bivariate First-Order {DPA}
                  Attacks},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {1:1--1:7},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092628},
  doi          = {10.1145/3092627.3092628},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/YuK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ZhangL17,
  author       = {Tianwei Zhang and
                  Ruby B. Lee},
  title        = {Host-Based Dos Attacks and Defense in the Cloud},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {3:1--3:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092630},
  doi          = {10.1145/3092627.3092630},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ZhangL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2017hasp,
  title        = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627},
  doi          = {10.1145/3092627},
  isbn         = {978-1-4503-5266-6},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/2017hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/AzrielGGM16,
  author       = {Leonid Azriel and
                  Ran Ginosar and
                  Shay Gueron and
                  Avi Mendelson},
  title        = {Using Scan Side Channel for Detecting {IP} Theft},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948619},
  doi          = {10.1145/2948618.2948619},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/AzrielGGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/BhattacharyaRM16,
  author       = {Sarani Bhattacharya and
                  Chester Rebeiro and
                  Debdeep Mukhopadhyay},
  title        = {A Formal Security Analysis of Even-Odd Sequential Prefetching in Profiled
                  Cache-Timing Attacks},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {6:1--6:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948624},
  doi          = {10.1145/2948618.2948624},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/BhattacharyaRM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/CheriseyGRJ16,
  author       = {Eloi de Ch{\'{e}}risey and
                  Sylvain Guilley and
                  Olivier Rioul and
                  Darshana Jayasinghe},
  title        = {Template Attacks with Partial Profiles and Dirichlet Priors: Application
                  to Timing Attacks},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {7:1--7:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948625},
  doi          = {10.1145/2948618.2948625},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/CheriseyGRJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/LeeL16,
  author       = {Wei{-}Han Lee and
                  Ruby B. Lee},
  title        = {Implicit Sensor-based Authentication of Smartphone Users with Smartwatch},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {9:1--9:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948627},
  doi          = {10.1145/2948618.2948627},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/LeeL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/McKeenAACJLR16,
  author       = {Frank McKeen and
                  Ilya Alexandrovich and
                  Ittai Anati and
                  Dror Caspi and
                  Simon Johnson and
                  Rebekah Leslie{-}Hurd and
                  Carlos V. Rozas},
  title        = {Intel{\textregistered} Software Guard Extensions (Intel{\textregistered}
                  {SGX)} Support for Dynamic Memory Management Inside an Enclave},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {10:1--10:9},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2954331},
  doi          = {10.1145/2948618.2954331},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/McKeenAACJLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/MoonLHJSP16,
  author       = {Hyungon Moon and
                  Jinyong Lee and
                  Dongil Hwang and
                  Seonhwa Jung and
                  Jiwon Seo and
                  Yunheung Paek},
  title        = {Architectural Supports to Protect {OS} Kernels from Code-Injection
                  Attacks},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {5:1--5:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948623},
  doi          = {10.1145/2948618.2948623},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/MoonLHJSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/RawatS16,
  author       = {Hemendra K. Rawat and
                  Patrick Schaumont},
  title        = {{SIMD} Instruction Set Extensions for Keccak with Applications to
                  SHA-3, Keyak and Ketje},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948622},
  doi          = {10.1145/2948618.2948622},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/RawatS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/TorresL16,
  author       = {Gildo Torres and
                  Chen Liu},
  title        = {Can Data-Only Exploits be Detected at Runtime Using Hardware Events?:
                  {A} Case Study of the Heartbleed Vulnerability},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {2:1--2:7},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948620},
  doi          = {10.1145/2948618.2948620},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/TorresL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/XingSL16,
  author       = {Bin Cedric Xing and
                  Mark Shanahan and
                  Rebekah Leslie{-}Hurd},
  title        = {Intel{\textregistered} Software Guard Extensions (Intel{\textregistered}
                  {SGX)} Software Support for Dynamic Memory Allocation inside an Enclave},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {11:1--11:9},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2954330},
  doi          = {10.1145/2948618.2954330},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/XingSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/YuceGDPNS16,
  author       = {Bilgiday Yuce and
                  Nahid Farhady Ghalaty and
                  Chinmay Deshpande and
                  Conor Patrick and
                  Leyla Nazhandali and
                  Patrick Schaumont},
  title        = {{FAME:} Fault-attack Aware Microprocessor Extensions for Hardware
                  Fault Detection and Software Fault Response},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {8:1--8:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948626},
  doi          = {10.1145/2948618.2948626},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/YuceGDPNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ZhangZ16,
  author       = {Fengwei Zhang and
                  Hongwei Zhang},
  title        = {SoK: {A} Study of Using Hardware-assisted Isolated Execution Environments
                  for Security},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {3:1--3:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948621},
  doi          = {10.1145/2948618.2948621},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/ZhangZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2016hasp,
  title        = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618},
  doi          = {10.1145/2948618},
  isbn         = {978-1-4503-4769-3},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/2016hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/AhmadHHDK15,
  author       = {Masab Ahmad and
                  Syed Kamran Haider and
                  Farrukh Hijaz and
                  Marten van Dijk and
                  Omer Khan},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Exploring the performance implications of memory safety primitives
                  in many-core processors executing multi-threaded workloads},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {6:1--6:8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768572},
  doi          = {10.1145/2768566.2768572},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/AhmadHHDK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/DeTranoGGKK15,
  author       = {Alexander DeTrano and
                  Sylvain Guilley and
                  Xiaofei Guo and
                  Naghmeh Karimi and
                  Ramesh Karri},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Exploiting small leakages in masks to turn a second-order attack into
                  a first-order attack},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {7:1--7:5},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768573},
  doi          = {10.1145/2768566.2768573},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/DeTranoGGKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/El-HadedyS15,
  author       = {Mohamed El{-}Hadedy and
                  Kevin Skadron},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Hardware overhead analysis of programmability in {ARX} crypto processing},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {8:1--8:4},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768574},
  doi          = {10.1145/2768566.2768574},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/El-HadedyS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/EvtyushkinPG15,
  author       = {Dmitry Evtyushkin and
                  Dmitry V. Ponomarev and
                  Nael B. Abu{-}Ghazaleh},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Covert channels through branch predictors: a feasibility study},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {5:1--5:8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768571},
  doi          = {10.1145/2768566.2768571},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/EvtyushkinPG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/JapSB15,
  author       = {Dirmanto Jap and
                  Marc St{\"{o}}ttinger and
                  Shivam Bhasin},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Support vector regression: exploiting machine learning techniques
                  for leakage modeling},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {2:1--2:8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768568},
  doi          = {10.1145/2768566.2768568},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/JapSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/LeeHHKP15,
  author       = {Yongje Lee and
                  Ingoo Heo and
                  Dongil Hwang and
                  Kyungmin Kim and
                  Yunheung Paek},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Towards a practical solution to detect code reuse attacks on {ARM}
                  mobile devices},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {3:1--3:8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768569},
  doi          = {10.1145/2768566.2768569},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/LeeHHKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/LiuWL15,
  author       = {Fangfei Liu and
                  Hao Wu and
                  Ruby B. Lee},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Can randomized mapping secure instruction caches from side-channel
                  attacks?},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768570},
  doi          = {10.1145/2768566.2768570},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/LiuWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/LuoFFDKL15,
  author       = {Pei Luo and
                  Yunsi Fei and
                  Xin Fang and
                  A. Adam Ding and
                  David R. Kaeli and
                  Miriam Leeser},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Side-channel analysis of MAC-Keccak hardware implementations},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768567},
  doi          = {10.1145/2768566.2768567},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/LuoFFDKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/NomaniS15,
  author       = {Junaid Nomani and
                  Jakub Szefer},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Predicting program phases and defending against side-channel attacks
                  using hardware performance counters},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {9:1--9:4},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768575},
  doi          = {10.1145/2768566.2768575},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/NomaniS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/OuaarabDP15,
  author       = {Salaheddine Ouaarab and
                  Guillaume Duc and
                  Renaud Pacalet},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Performance optimizations of integrity checking based on Merkle trees},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {10:1--10:4},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768576},
  doi          = {10.1145/2768566.2768576},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/OuaarabDP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2015hasp,
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566},
  doi          = {10.1145/2768566},
  isbn         = {978-1-4503-3483-9},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/2015hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/0020V14,
  author       = {Jie Chen and
                  Guru Venkataramani},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {An algorithm for detecting contention-based covert timing channels
                  on shared hardware},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611766},
  doi          = {10.1145/2611765.2611766},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/0020V14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/BhasinDGN14,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side-channel leakage and trace compression using normalized inter-class
                  variance},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {7:1--7:9},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611772},
  doi          = {10.1145/2611765.2611772},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/BhasinDGN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ChoutaGDBBBFC14,
  author       = {Taoufik Chouta and
                  Tarik Graba and
                  Jean{-}Luc Danger and
                  Julien Bringer and
                  Ma{\"{e}}l Berthier and
                  Yves Bocktaels and
                  M{\'{e}}lanie Favre and
                  Herv{\'{e}} Chabanne},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side channel analysis on an embedded hardware fingerprint biometric
                  comparator {\&} low cost countermeasures},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {6:1--6:6},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611771},
  doi          = {10.1145/2611765.2611771},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/ChoutaGDBBBFC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/DhawanVRCSKPD14,
  author       = {Udit Dhawan and
                  Nikos Vasilakis and
                  Raphael Rubin and
                  Silviu Chiricescu and
                  Jonathan M. Smith and
                  Thomas F. Knight Jr. and
                  Benjamin C. Pierce and
                  Andr{\'{e}} DeHon},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {{PUMP:} a programmable unit for metadata processing},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {8:1--8:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611773},
  doi          = {10.1145/2611765.2611773},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/DhawanVRCSKPD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/FerrettiMM14,
  author       = {Claudio Ferretti and
                  Silvia Mella and
                  Filippo Melzani},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {The role of the fault model in {DFA} against {AES}},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611769},
  doi          = {10.1145/2611765.2611769},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/FerrettiMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/GunduSSPJBT14,
  author       = {Akhila Gundu and
                  Gita Sreekumar and
                  Ali Shafiee and
                  Seth H. Pugsley and
                  Hardik B. Jain and
                  Rajeev Balasubramonian and
                  Mohit Tiwari},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Memory bandwidth reservation in the cloud to avoid information leakage
                  in the memory controller},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {11:1--11:5},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611776},
  doi          = {10.1145/2611765.2611776},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/GunduSSPJBT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/KazdagliHRT14,
  author       = {Mikhail Kazdagli and
                  Ling Huang and
                  Vijay Janapa Reddi and
                  Mohit Tiwari},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Morpheus: benchmarking computational diversity in mobile malware},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {3:1--3:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611767},
  doi          = {10.1145/2611765.2611767},
  timestamp    = {Mon, 18 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/KazdagliHRT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/SwamySLFK14,
  author       = {Tushar Swamy and
                  Neel Shah and
                  Pei Luo and
                  Yunsi Fei and
                  David R. Kaeli},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Scalable and efficient implementation of correlation power analysis
                  using graphics processing units (GPUs)},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {10:1--10:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611775},
  doi          = {10.1145/2611765.2611775},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/SwamySLFK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/SzeferB14,
  author       = {Jakub Szefer and
                  Sebastian Biedermann},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Towards fast hardware memory integrity checking with skewed Merkle
                  trees},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {9:1--9:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611774},
  doi          = {10.1145/2611765.2611774},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/SzeferB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/XuSD14,
  author       = {Lei Xu and
                  Weidong Shi and
                  Nicholas DeSalvo},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Seasoning effect based side channel attacks to {AES} implementation
                  with phase change memory},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {5:1--5:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611770},
  doi          = {10.1145/2611765.2611770},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/XuSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/YueRWC14,
  author       = {Mengchao Yue and
                  William H. Robinson and
                  Lanier A. Watkins and
                  Cherita L. Corbett},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Constructing timing-based covert channels in mobile networks by adjusting
                  {CPU} frequency},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {2:1--2:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611768},
  doi          = {10.1145/2611765.2611768},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/YueRWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2014hasp,
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765},
  doi          = {10.1145/2611765},
  isbn         = {978-1-4503-2777-0},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/2014hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/BhattacharyaRM13,
  author       = {Sarani Bhattacharya and
                  Chester Rebeiro and
                  Debdeep Mukhopadhyay},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Unraveling timewarp: what all the fuzz is about?},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {8},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487734},
  doi          = {10.1145/2487726.2487734},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/BhattacharyaRM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/CarletG13,
  author       = {Claude Carlet and
                  Sylvain Guilley},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side-channel indistinguishability},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {9},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487735},
  doi          = {10.1145/2487726.2487735},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/CarletG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/CherifDLMB13,
  author       = {Zouha Cherif and
                  Jean{-}Luc Danger and
                  Florent Lozach and
                  Yves Mathieu and
                  Lilian Bossuet},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Evaluation of delay PUFs on {CMOS} 65 nm technology: {ASIC} vs {FPGA}},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {4},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487730},
  doi          = {10.1145/2487726.2487730},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/CherifDLMB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/GeWLK13,
  author       = {Shizun Ge and
                  Zhen Wang and
                  Pei Luo and
                  Mark G. Karpovsky},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Secure memories resistant to both random errors and fault injection
                  attacks using nonlinear error correction codes},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487731},
  doi          = {10.1145/2487726.2487731},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/GeWLK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/HoekstraLPPC13,
  author       = {Matthew Hoekstra and
                  Reshma Lal and
                  Pradeep Pappachan and
                  Vinay Phegade and
                  Juan del Cuvillo},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Using innovative instructions to create trustworthy software solutions},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {11},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2488370},
  doi          = {10.1145/2487726.2488370},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/HoekstraLPPC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/LiuL13,
  author       = {Fangfei Liu and
                  Ruby B. Lee},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Security testing of a secure cache design},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487729},
  doi          = {10.1145/2487726.2487729},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/LiuL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/McKeenABRSSS13,
  author       = {Frank McKeen and
                  Ilya Alexandrovich and
                  Alex Berenzon and
                  Carlos V. Rozas and
                  Hisham Shafi and
                  Vedvyas Shanbhogue and
                  Uday R. Savagaonkar},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Innovative instructions and software model for isolated execution},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {10},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2488368},
  doi          = {10.1145/2487726.2488368},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/McKeenABRSSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/MuehlberghuberGKDH13,
  author       = {Michael Muehlberghuber and
                  Frank K. G{\"{u}}rkaynak and
                  Thomas Korak and
                  Philipp Dunst and
                  Michael Hutter},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Red team vs. blue team hardware trojan analysis: detection of a hardware
                  trojan on an actual {ASIC}},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487727},
  doi          = {10.1145/2487726.2487727},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/MuehlberghuberGKDH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/OrenWW13,
  author       = {Yossef Oren and
                  Ofir Weisse and
                  Avishai Wool},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Practical template-algebraic side channel attacks with extremely low
                  data complexity},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {7},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487733},
  doi          = {10.1145/2487726.2487733},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/OrenWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/SantosF13,
  author       = {Juan Carlos Mart{\'{\i}}nez Santos and
                  Yunsi Fei},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Micro-architectural support for metadata coherence in multi-core dynamic
                  information flow tracking},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487732},
  doi          = {10.1145/2487726.2487732},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/SantosF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ZhangLCL13,
  author       = {Tianwei Zhang and
                  Fangfei Liu and
                  Si Chen and
                  Ruby B. Lee},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side channel vulnerability metrics: the promise and the pitfalls},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487728},
  doi          = {10.1145/2487726.2487728},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/ZhangLCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2013hasp,
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726},
  doi          = {10.1145/2487726},
  isbn         = {978-1-4503-2118-1},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/2013hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}