


default search action
Search dblp for Publications
export results for "stream:conf/hasp:"
@inproceedings{DBLP:conf/hasp/AsgharBZ24, author = {Ali Asghar and Andreas Becher and Daniel Ziener}, title = {Short Paper: Analysis of Vivado implementation strategies regarding side-channel leakage for FPGA-based {AES} implementations}, booktitle = {Proceedings of the 13th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2024, Austin, TX, USA, 2 November 2024}, pages = {45--49}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3696843.3696853}, doi = {10.1145/3696843.3696853}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/AsgharBZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/CathisLWOTG24, author = {Alexander Cathis and Ge Li and Shijia Wei and Michael Orshansky and Mohit Tiwari and Andreas Gerstlauer}, title = {SoK Paper: Power Side-Channel Malware Detection}, booktitle = {Proceedings of the 13th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2024, Austin, TX, USA, 2 November 2024}, pages = {1--9}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3696843.3696849}, doi = {10.1145/3696843.3696849}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/CathisLWOTG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/KaranjaiSXFCZSS24, author = {Rabimba Karanjai and Sangwon Shin and Wujie Xiong and Xinxin Fan and Lin Chen and Tianwei Zhang and Taeweon Suh and Weidong Shi and Veronika Kuchta and Francesco Sica and Lei Xu}, title = {{TPU} as Cryptographic Accelerator}, booktitle = {Proceedings of the 13th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2024, Austin, TX, USA, 2 November 2024}, pages = {37--44}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3696843.3696844}, doi = {10.1145/3696843.3696844}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/KaranjaiSXFCZSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/KunduG24, author = {Satwik Kundu and Swaroop Ghosh}, title = {SoK Paper: Security Concerns in Quantum Machine Learning as a Service}, booktitle = {Proceedings of the 13th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2024, Austin, TX, USA, 2 November 2024}, pages = {28--36}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3696843.3696846}, doi = {10.1145/3696843.3696846}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/KunduG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/NamboothiryDDL24, author = {Bharath Namboothiry and David Durham and Christoph Dobraunig and Michael LeMay}, title = {Cryptographic Memory Tagging: Towards Stateless Integrity}, booktitle = {Proceedings of the 13th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2024, Austin, TX, USA, 2 November 2024}, pages = {50--58}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3696843.3696845}, doi = {10.1145/3696843.3696845}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/NamboothiryDDL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/Woralert0B24, author = {Chutitep Woralert and Chen Liu and Zander Blasingame}, title = {Towards Effective Machine Learning Models for Ransomware Detection via Low-Level Hardware Information}, booktitle = {Proceedings of the 13th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2024, Austin, TX, USA, 2 November 2024}, pages = {10--18}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3696843.3696847}, doi = {10.1145/3696843.3696847}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/Woralert0B24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/YeKDFPFRBC24, author = {Mengmei Ye and Sandhya Koteshwara and Derren Dunn and Hubertus Franke and Chris Porter and Tobin Feldman{-}Fitzthum and Angelo Ruocco and Daniele Buono and Cl{\'{a}}udio Carvalho}, title = {Position Paper: From Confidential Computing to Zero Trust, Come Along for the (Bumpy?) Ride}, booktitle = {Proceedings of the 13th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2024, Austin, TX, USA, 2 November 2024}, pages = {19--27}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3696843.3696848}, doi = {10.1145/3696843.3696848}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/YeKDFPFRBC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hasp/2024, title = {Proceedings of the 13th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2024, Austin, TX, USA, 2 November 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3696843}, doi = {10.1145/3696843}, isbn = {979-8-4007-1221-0}, timestamp = {Thu, 31 Oct 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/0002KAHJ23, author = {Karthik Ganesan and Viktor Karyofyllis and Julianne Attai and Ahmed Hamoda and Natalie Enright Jerger}, title = {{DINAR:} Enabling Distribution Agnostic Noise Injection in Machine Learning Hardware}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {38--46}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623665}, doi = {10.1145/3623652.3623665}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/0002KAHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/Banerjee23, author = {Sarbartha Banerjee}, title = {Triton: Software-Defined Threat Model for Secure Multi-Tenant {ML} Inference Accelerators}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {19--28}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623672}, doi = {10.1145/3623652.3623672}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/Banerjee23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/BrunHOS23, author = {L{\'{e}}lio Brun and Ichiro Hasuo and Yasushi Ono and Taro Sekiyama}, title = {Automated Security Analysis for Real-World IoT Devices}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {29--37}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623667}, doi = {10.1145/3623652.3623667}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/BrunHOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/ChiuX23, author = {Tinghung Chiu and Wenjie Xiong}, title = {SoK: Fault Injection Attacks on Cryptosystems}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {64--72}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623671}, doi = {10.1145/3623652.3623671}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/ChiuX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/Das23, author = {Subrata Das}, title = {SoK: {A} First Order Survey of Quantum Supply Dynamics and Threat Landscapes}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {82--90}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623664}, doi = {10.1145/3623652.3623664}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/Das23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/ForcioliDC23, author = {Quentin Forcioli and Jean{-}Luc Danger and Sumanta Chaudhuri}, title = {A gem5 based Platform for Micro-Architectural Security Analysis}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {91--99}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623674}, doi = {10.1145/3623652.3623674}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/ForcioliDC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/LalAJ23, author = {Reshma Lal and James B. Anderson and Andrew Jackson}, title = {Data Processing Unit's Entry into Confidential Computing}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {56--63}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623670}, doi = {10.1145/3623652.3623670}, timestamp = {Wed, 26 Feb 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/LalAJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/LiuR023, author = {William Liu and Joseph Ravichandran and Mengjia Yan}, title = {EntryBleed: {A} Universal {KASLR} Bypass against {KPTI} on Linux}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {10--18}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623669}, doi = {10.1145/3623652.3623669}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/LiuR023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/OrieroKS23, author = {Enahoro Oriero and Faiq Khalid and Syed Rafay Hasan}, title = {DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {47--55}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623673}, doi = {10.1145/3623652.3623673}, timestamp = {Sat, 27 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/OrieroKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/Ozga23, author = {Wojciech Ozga}, title = {Towards a Formally Verified Security Monitor for VM-based Confidential Computing}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {73--81}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623668}, doi = {10.1145/3623652.3623668}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/Ozga23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/RyanGS23, author = {Kaki Ryan and Matthew Gregoire and Cynthia Sturton}, title = {{SEIF:} Augmented Symbolic Execution for Information Flow in Hardware Designs}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {1--9}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623666}, doi = {10.1145/3623652.3623666}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/RyanGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hasp/2023, title = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652}, doi = {10.1145/3623652}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/BiringaBK22, author = {Chidera Biringa and Gaspard Baye and G{\"{o}}khan Kul}, title = {Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks}, booktitle = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, pages = {53--57}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562.3569589}, doi = {10.1145/3569562.3569589}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/BiringaBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/Bisheh-NiasarAA22, author = {Mojtaba Bisheh{-}Niasar and Mila Anastasova and Abubakr Abdulgadir and Hwajeong Seo and Reza Azarderakhsh}, title = {Side-Channel Analysis and Countermeasure Design for Implementation of Curve448 on Cortex-M4}, booktitle = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, pages = {10--17}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562.3569564}, doi = {10.1145/3569562.3569564}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hasp/Bisheh-NiasarAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/ChenAK22, author = {Xiaoyue Chen and Pavlos Aimoniotis and Stefanos Kaxiras}, title = {Clueless: {A} Tool Characterising Values Leaking as Addresses}, booktitle = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, pages = {27--34}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562.3569566}, doi = {10.1145/3569562.3569566}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hasp/ChenAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/KucukMMMA22, author = {Kubilay Ahmet K{\"{u}}{\c{c}}{\"{u}}k and Steve Moyle and Andrew Martin and Alexandru Mereacre and Nicholas Allott}, title = {SoK: How Not to Architect Your Next-Generation {TEE} Malware?}, booktitle = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, pages = {35--44}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562.3569568}, doi = {10.1145/3569562.3569568}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/KucukMMMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/Naseredini0SX22, author = {Amir Naseredini and Martin Berger and Matteo Sammartino and Shale Xiong}, title = {{ALARM:} Active LeArning of Rowhammer Mitigations}, booktitle = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, pages = {1--9}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562.3569563}, doi = {10.1145/3569562.3569563}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/Naseredini0SX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/SchillingNUM22, author = {Robert Schilling and Pascal Nasahl and Martin Unterguggenberger and Stefan Mangard}, title = {{SFP:} Providing System Call Flow Protection against Software and Fault Attacks}, booktitle = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, pages = {18--26}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562.3569565}, doi = {10.1145/3569562.3569565}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/SchillingNUM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/UpadhyayG22, author = {Suryansh Upadhyay and Swaroop Ghosh}, title = {Robust and Secure Hybrid Quantum-Classical Computation on Untrusted Cloud-Based Quantum Hardware}, booktitle = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, pages = {45--52}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562.3569569}, doi = {10.1145/3569562.3569569}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/UpadhyayG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hasp/2022, title = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562}, doi = {10.1145/3569562}, isbn = {978-1-4503-9871-8}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hasp/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/0004JL21, author = {Tianwei Zhang and Jakub Szefer and Ruby B. Lee}, title = {Practical and Scalable Security Verification of Secure Architectures}, booktitle = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, pages = {2:1--2:9}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253.3505256}, doi = {10.1145/3505253.3505256}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/0004JL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/ChoudhuryTF21, author = {Muhtadi Choudhury and Shahin Tajik and Domenic Forte}, title = {{SPARSE:} Spatially Aware {LFI} Resilient State Machine Encoding}, booktitle = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253.3505254}, doi = {10.1145/3505253.3505254}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/ChoudhuryTF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/LiDS21, author = {Allen Mi and Shuwen Deng and Jakub Szefer}, title = {Short Paper: Device- and Locality-Specific Fingerprinting of Shared {NISQ} Quantum Computers}, booktitle = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, pages = {7:1--7:6}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253.3505261}, doi = {10.1145/3505253.3505261}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/LiDS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/LiHRLNCZ21, author = {Haonan Li and Weijie Huang and Mingde Ren and Hongyi Lu and Zhenyu Ning and Heming Cui and Fengwei Zhang}, title = {A Novel Memory Management for {RISC-V} Enclaves}, booktitle = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, pages = {3:1--3:9}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253.3505257}, doi = {10.1145/3505253.3505257}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/LiHRLNCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/MohammedKSCH21, author = {Hawzhin Mohammed and Faiq Khalid and Paul Sawyer and Gabriella Cataloni and Syed Rafay Hasan}, title = {InTrust-IoT: Intelligent Ecosystem based on Power Profiling of Trusted device(s) in IoT for Hardware Trojan Detection}, booktitle = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, pages = {8:1--8:8}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253.3505262}, doi = {10.1145/3505253.3505262}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/MohammedKSCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/ShiXCZG21, author = {Rabimba Karanjai and Weidong Shi and Lei Xu and Lin Chen and Fengwei Zhang and Zhimin Gao}, title = {Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research}, booktitle = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, pages = {5:1--5:8}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253.3505259}, doi = {10.1145/3505253.3505259}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/ShiXCZG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/SureshAATG21, author = {Aakarshitha Suresh and Abdullah Ash{-}Saki and Mahababul Alam and Rasit Onur Topaloglu and Swaroop Ghosh}, title = {Short Paper: {A} Quantum Circuit Obfuscation Methodology for Security and Privacy}, booktitle = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, pages = {6:1--6:5}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253.3505260}, doi = {10.1145/3505253.3505260}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/SureshAATG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/YoshidaSF21, author = {Kota Yoshida and Kuniyasu Suzaki and Takeshi Fujino}, title = {Towards Trusted IoT Sensing Systems: Implementing {PUF} as Secure Key Generator for Root of Trust and Message Authentication Code}, booktitle = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253.3505258}, doi = {10.1145/3505253.3505258}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/YoshidaSF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/micro/2021hasp, title = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253}, doi = {10.1145/3505253}, isbn = {978-1-4503-9614-1}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/2021hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/DangwalCALRT20, author = {Deeksha Dangwal and Meghan Cowan and Armin Alaghi and Vincent T. Lee and Brandon Reagen and Caroline Trippel}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {8:1--8:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458911}, doi = {10.1145/3458903.3458911}, timestamp = {Tue, 26 Oct 2021 15:43:33 +0200}, biburl = {https://dblp.org/rec/conf/micro/DangwalCALRT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/DelgadoVK20, author = {Brian Delgado and Tejaswini Vibhute and Karen L. Karavanic}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Applying the Principle of Least Privilege to System Management Interrupt Handlers with the Intel {SMI} Transfer Monitor}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {4:1--4:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458907}, doi = {10.1145/3458903.3458907}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/DelgadoVK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/Hu0L20, author = {Guangyuan Hu and Tianwei Zhang and Ruby B. Lee}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {6:1--6:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458909}, doi = {10.1145/3458903.3458909}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/Hu0L20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/Koteshwara0P20, author = {Sandhya Koteshwara and Manoj Kumar and Pratap Pattnaik}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Analysis and Hardware Optimization of Lattice Post-Quantum Cryptography Workloads}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {2:1--2:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458905}, doi = {10.1145/3458903.3458905}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/Koteshwara0P20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/MarkettosBBNMW20, author = {A. Theodore Markettos and John Baldwin and Ruslan Bukin and Peter G. Neumann and Simon W. Moore and Robert N. M. Watson}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Position Paper: Defending Direct Memory Access with {CHERI} Capabilities}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {7:1--7:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458910}, doi = {10.1145/3458903.3458910}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/MarkettosBBNMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/MarshallPP20, author = {Ben Marshall and Daniel Page and Thinh Hung Pham}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Implementing the Draft {RISC-V} Scalar Cryptography Extensions}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458904}, doi = {10.1145/3458903.3458904}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/MarshallPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/MoraitisD20, author = {Michail Moraitis and Elena Dubrova}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {{FPGA} Bitstream Modification with Interconnect in Mind}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {5:1--5:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458908}, doi = {10.1145/3458903.3458908}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/MoraitisD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/StrupeK20, author = {Fredrik Strupe and Rakesh Kumar}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Uncovering Hidden Instructions in Armv8-A Implementations}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {3:1--3:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458906}, doi = {10.1145/3458903.3458906}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/StrupeK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/micro/2020hasp, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903}, doi = {10.1145/3458903}, isbn = {978-1-4503-8898-6}, timestamp = {Tue, 26 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/2020hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/0056019, author = {Xin Wang and Wei Zhang}, title = {Cracking Randomized Coalescing Techniques with An Efficient Profiling-Based Side-Channel Attack to {GPU}}, booktitle = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, pages = {2:1--2:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167.3337169}, doi = {10.1145/3337167.3337169}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/0056019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ChakrabartiHKV19, author = {Somnath Chakrabarti and Matthew Hoekstra and Dmitrii Kuvaiskii and Mona Vij}, title = {Scaling Intel{\textregistered} Software Guard Extensions Applications with Intel{\textregistered} {SGX} Card}, booktitle = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, pages = {6:1--6:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167.3337173}, doi = {10.1145/3337167.3337173}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/ChakrabartiHKV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/DengG0SGLDS19, author = {Shuwen Deng and Doguhan G{\"{u}}m{\"{u}}soglu and Wenjie Xiong and Sercan Sari and Y. Serhan Gener and Corine Lu and Onur Demir and Jakub Szefer}, title = {SecChisel Framework for Security Verification of Secure Processor Architectures}, booktitle = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, pages = {7:1--7:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167.3337174}, doi = {10.1145/3337167.3337174}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/DengG0SGLDS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/DisselkoenRWGLS19, author = {Craig Disselkoen and John Renner and Conrad Watt and Tal Garfinkel and Amit Levy and Deian Stefan}, title = {Position Paper: Progressive Memory Safety for WebAssembly}, booktitle = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167.3337171}, doi = {10.1145/3337167.3337171}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/DisselkoenRWGLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ShanbhogueGS19, author = {Vedvyas Shanbhogue and Deepak Gupta and Ravi Sahita}, title = {Security Analysis of Processor Instruction Set Architecture for Enforcing Control-Flow Integrity}, booktitle = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, pages = {8:1--8:11}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167.3337175}, doi = {10.1145/3337167.3337175}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/ShanbhogueGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ShimizuTJP19, author = {Atsuko Shimizu and Daniel Townley and Mohit Joshi and Dmitry Ponomarev}, title = {{EA-PLRU:} Enclave-Aware Cache Replacement}, booktitle = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, pages = {5:1--5:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167.3337172}, doi = {10.1145/3337167.3337172}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/ShimizuTJP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/TMPD19, author = {Santhosh Kumar T and Debadatta Mishra and Biswabandan Panda and Nayan Deshmukh}, title = {CoWLight: Hardware Assisted Copy-on-Write Fault Handling for Secure Deduplication}, booktitle = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, pages = {3:1--3:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167.3337170}, doi = {10.1145/3337167.3337170}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/TMPD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/TorresYBBL19, author = {Gildo Torres and Zhiliu Yang and Zander Blasingame and James Bruska and Chen Liu}, title = {Detecting Non-Control-Flow Hijacking Attacks Using Contextual Execution Information}, booktitle = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167.3337168}, doi = {10.1145/3337167.3337168}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/TorresYBBL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2019hasp, title = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167}, doi = {10.1145/3337167}, isbn = {978-1-4503-7226-8}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/2019hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/DengXS18, author = {Shuwen Deng and Wenjie Xiong and Jakub Szefer}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Cache timing side-channel vulnerability checking with computation tree logic}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {2:1--2:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214294}, doi = {10.1145/3214292.3214294}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/DengXS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/DongSCCD18, author = {Xiaowan Dong and Zhuojia Shen and John Criswell and Alan L. Cox and Sandhya Dwarkadas}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Spectres, virtual ghosts, and hardware support}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {5:1--5:9}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214297}, doi = {10.1145/3214292.3214297}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/DongSCCD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/KhanG18, author = {Mohammad Nasim Imtiaz Khan and Swaroop Ghosh}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Fault injection attacks on emerging non-volatile memory and countermeasures}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {10:1--10:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214302}, doi = {10.1145/3214292.3214302}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/KhanG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/Lowe-PowerAFKN18, author = {Jason Lowe{-}Power and Venkatesh Akella and Matthew K. Farrens and Samuel T. King and Christopher J. Nitta}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {A case for exposing extra-architectural state in the {ISA:} position paper}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {8:1--8:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214300}, doi = {10.1145/3214292.3214300}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/Lowe-PowerAFKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/MofradZLS18, author = {Saeid Mofrad and Fengwei Zhang and Shiyong Lu and Weidong Shi}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {A comparison study of intel {SGX} and {AMD} memory encryption technology}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {9:1--9:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214301}, doi = {10.1145/3214292.3214301}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/MofradZLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/MushtaqABCLG18, author = {Maria Mushtaq and Ayaz Akram and Muhammad Khurram Bhatti and Maham Chaudhry and Vianney Lapotre and Guy Gogniat}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {NIGHTs-WATCH: a cache-based side-channel intrusion detector using hardware performance counters}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214293}, doi = {10.1145/3214292.3214293}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/MushtaqABCLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/PetersLVPK18, author = {Travis Peters and Reshma Lal and Srikanth Varadarajan and Pradeep Pappachan and David Kotz}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {{BASTION-SGX:} bluetooth and architectural support for trusted {I/O} on {SGX}}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {3:1--3:9}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214295}, doi = {10.1145/3214292.3214295}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/PetersLVPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/VigLBM18, author = {Saru Vig and Siew{-}Kei Lam and Sarani Bhattacharya and Debdeep Mukhopadhyay}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Rapid detection of rowhammer attacks using dynamic skewed hash tree}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {7:1--7:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214299}, doi = {10.1145/3214292.3214299}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/VigLBM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/VuongSTB18, author = {Andrew Vuong and Ali Shafiee and Meysam Taassori and Rajeev Balasubramonian}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {An MLP-aware leakage-free memory controller}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {4:1--4:7}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214296}, doi = {10.1145/3214292.3214296}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/VuongSTB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/WongHC18, author = {Ming Ming Wong and Jawad Haj{-}Yahya and Anupam Chattopadhyay}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {{SMARTS:} secure memory assurance of {RISC-V} trusted SoC}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {6:1--6:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214298}, doi = {10.1145/3214292.3214298}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/WongHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2018hasp, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292}, doi = {10.1145/3214292}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/2018hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/AriasSJ17, author = {Orlando Arias and Dean Sullivan and Yier Jin}, title = {HA2lloc: Hardware-Assisted Secure Allocator}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {8:1--8:7}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092635}, doi = {10.1145/3092627.3092635}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/AriasSJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ChakrabartiLVMR17, author = {Somnath Chakrabarti and Rebekah Leslie{-}Hurd and Mona Vij and Frank McKeen and Carlos V. Rozas and Dror Caspi and Ilya Alexandrovich and Ittai Anati}, title = {Intel{\textregistered} Software Guard Extensions (Intel{\textregistered} {SGX)} Architecture for Oversubscription of Secure Memory in a Virtualized Environment}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {7:1--7:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092634}, doi = {10.1145/3092627.3092634}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/ChakrabartiLVMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/GhoshMZS17, author = {Santosh Ghosh and Rafael Misoczki and Li Zhao and Manoj R. Sastry}, title = {Lightweight Block Cipher Circuits for Automotive and IoT Sensor Devices}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {5:1--5:7}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092632}, doi = {10.1145/3092627.3092632}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/GhoshMZS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/MenonMRGV17, author = {Arjun Menon and Subadra Murugan and Chester Rebeiro and Neel Gala and Kamakoti Veezhinathan}, title = {Shakti-T: {A} {RISC-V} Processor with Light Weight Security Extensions}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {2:1--2:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092629}, doi = {10.1145/3092627.3092629}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/MenonMRGV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/NingZSS17, author = {Zhenyu Ning and Fengwei Zhang and Weisong Shi and Weidong Shi}, title = {Position Paper: Challenges Towards Securing Hardware-assisted Execution Environments}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {6:1--6:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092633}, doi = {10.1145/3092627.3092633}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/NingZSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ShwartzB17, author = {Ofir Shwartz and Yitzhak Birk}, title = {SeM: {A} {CPU} Architecture Extension for Secure Remote Computing}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092631}, doi = {10.1145/3092627.3092631}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/ShwartzB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/YuK17, author = {Weize Yu and Sel{\c{c}}uk K{\"{o}}se}, title = {A Lightweight {AES} Implementation Against Bivariate First-Order {DPA} Attacks}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {1:1--1:7}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092628}, doi = {10.1145/3092627.3092628}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/YuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ZhangL17, author = {Tianwei Zhang and Ruby B. Lee}, title = {Host-Based Dos Attacks and Defense in the Cloud}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {3:1--3:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092630}, doi = {10.1145/3092627.3092630}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/ZhangL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2017hasp, title = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627}, doi = {10.1145/3092627}, isbn = {978-1-4503-5266-6}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/2017hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/AzrielGGM16, author = {Leonid Azriel and Ran Ginosar and Shay Gueron and Avi Mendelson}, title = {Using Scan Side Channel for Detecting {IP} Theft}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948619}, doi = {10.1145/2948618.2948619}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/AzrielGGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/BhattacharyaRM16, author = {Sarani Bhattacharya and Chester Rebeiro and Debdeep Mukhopadhyay}, title = {A Formal Security Analysis of Even-Odd Sequential Prefetching in Profiled Cache-Timing Attacks}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {6:1--6:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948624}, doi = {10.1145/2948618.2948624}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/BhattacharyaRM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/CheriseyGRJ16, author = {Eloi de Ch{\'{e}}risey and Sylvain Guilley and Olivier Rioul and Darshana Jayasinghe}, title = {Template Attacks with Partial Profiles and Dirichlet Priors: Application to Timing Attacks}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {7:1--7:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948625}, doi = {10.1145/2948618.2948625}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/CheriseyGRJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/LeeL16, author = {Wei{-}Han Lee and Ruby B. Lee}, title = {Implicit Sensor-based Authentication of Smartphone Users with Smartwatch}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {9:1--9:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948627}, doi = {10.1145/2948618.2948627}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/LeeL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/McKeenAACJLR16, author = {Frank McKeen and Ilya Alexandrovich and Ittai Anati and Dror Caspi and Simon Johnson and Rebekah Leslie{-}Hurd and Carlos V. Rozas}, title = {Intel{\textregistered} Software Guard Extensions (Intel{\textregistered} {SGX)} Support for Dynamic Memory Management Inside an Enclave}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {10:1--10:9}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2954331}, doi = {10.1145/2948618.2954331}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/McKeenAACJLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/MoonLHJSP16, author = {Hyungon Moon and Jinyong Lee and Dongil Hwang and Seonhwa Jung and Jiwon Seo and Yunheung Paek}, title = {Architectural Supports to Protect {OS} Kernels from Code-Injection Attacks}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {5:1--5:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948623}, doi = {10.1145/2948618.2948623}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/MoonLHJSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/RawatS16, author = {Hemendra K. Rawat and Patrick Schaumont}, title = {{SIMD} Instruction Set Extensions for Keccak with Applications to SHA-3, Keyak and Ketje}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948622}, doi = {10.1145/2948618.2948622}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/RawatS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/TorresL16, author = {Gildo Torres and Chen Liu}, title = {Can Data-Only Exploits be Detected at Runtime Using Hardware Events?: {A} Case Study of the Heartbleed Vulnerability}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {2:1--2:7}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948620}, doi = {10.1145/2948618.2948620}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/TorresL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/XingSL16, author = {Bin Cedric Xing and Mark Shanahan and Rebekah Leslie{-}Hurd}, title = {Intel{\textregistered} Software Guard Extensions (Intel{\textregistered} {SGX)} Software Support for Dynamic Memory Allocation inside an Enclave}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {11:1--11:9}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2954330}, doi = {10.1145/2948618.2954330}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/XingSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/YuceGDPNS16, author = {Bilgiday Yuce and Nahid Farhady Ghalaty and Chinmay Deshpande and Conor Patrick and Leyla Nazhandali and Patrick Schaumont}, title = {{FAME:} Fault-attack Aware Microprocessor Extensions for Hardware Fault Detection and Software Fault Response}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {8:1--8:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948626}, doi = {10.1145/2948618.2948626}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/YuceGDPNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ZhangZ16, author = {Fengwei Zhang and Hongwei Zhang}, title = {SoK: {A} Study of Using Hardware-assisted Isolated Execution Environments for Security}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {3:1--3:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948621}, doi = {10.1145/2948618.2948621}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/ZhangZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2016hasp, title = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618}, doi = {10.1145/2948618}, isbn = {978-1-4503-4769-3}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/2016hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/AhmadHHDK15, author = {Masab Ahmad and Syed Kamran Haider and Farrukh Hijaz and Marten van Dijk and Omer Khan}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Exploring the performance implications of memory safety primitives in many-core processors executing multi-threaded workloads}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {6:1--6:8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768572}, doi = {10.1145/2768566.2768572}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/AhmadHHDK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/DeTranoGGKK15, author = {Alexander DeTrano and Sylvain Guilley and Xiaofei Guo and Naghmeh Karimi and Ramesh Karri}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Exploiting small leakages in masks to turn a second-order attack into a first-order attack}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {7:1--7:5}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768573}, doi = {10.1145/2768566.2768573}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/DeTranoGGKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/El-HadedyS15, author = {Mohamed El{-}Hadedy and Kevin Skadron}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Hardware overhead analysis of programmability in {ARX} crypto processing}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {8:1--8:4}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768574}, doi = {10.1145/2768566.2768574}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/El-HadedyS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/EvtyushkinPG15, author = {Dmitry Evtyushkin and Dmitry V. Ponomarev and Nael B. Abu{-}Ghazaleh}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Covert channels through branch predictors: a feasibility study}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {5:1--5:8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768571}, doi = {10.1145/2768566.2768571}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/EvtyushkinPG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/JapSB15, author = {Dirmanto Jap and Marc St{\"{o}}ttinger and Shivam Bhasin}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Support vector regression: exploiting machine learning techniques for leakage modeling}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {2:1--2:8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768568}, doi = {10.1145/2768566.2768568}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/JapSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/LeeHHKP15, author = {Yongje Lee and Ingoo Heo and Dongil Hwang and Kyungmin Kim and Yunheung Paek}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Towards a practical solution to detect code reuse attacks on {ARM} mobile devices}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {3:1--3:8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768569}, doi = {10.1145/2768566.2768569}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/LeeHHKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/LiuWL15, author = {Fangfei Liu and Hao Wu and Ruby B. Lee}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Can randomized mapping secure instruction caches from side-channel attacks?}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768570}, doi = {10.1145/2768566.2768570}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/LiuWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/LuoFFDKL15, author = {Pei Luo and Yunsi Fei and Xin Fang and A. Adam Ding and David R. Kaeli and Miriam Leeser}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Side-channel analysis of MAC-Keccak hardware implementations}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768567}, doi = {10.1145/2768566.2768567}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/LuoFFDKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/NomaniS15, author = {Junaid Nomani and Jakub Szefer}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Predicting program phases and defending against side-channel attacks using hardware performance counters}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {9:1--9:4}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768575}, doi = {10.1145/2768566.2768575}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/NomaniS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/OuaarabDP15, author = {Salaheddine Ouaarab and Guillaume Duc and Renaud Pacalet}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Performance optimizations of integrity checking based on Merkle trees}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {10:1--10:4}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768576}, doi = {10.1145/2768566.2768576}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/OuaarabDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2015hasp, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566}, doi = {10.1145/2768566}, isbn = {978-1-4503-3483-9}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/2015hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/0020V14, author = {Jie Chen and Guru Venkataramani}, editor = {Ruby B. Lee and Weidong Shi}, title = {An algorithm for detecting contention-based covert timing channels on shared hardware}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611766}, doi = {10.1145/2611765.2611766}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/0020V14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/BhasinDGN14, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side-channel leakage and trace compression using normalized inter-class variance}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {7:1--7:9}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611772}, doi = {10.1145/2611765.2611772}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/BhasinDGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ChoutaGDBBBFC14, author = {Taoufik Chouta and Tarik Graba and Jean{-}Luc Danger and Julien Bringer and Ma{\"{e}}l Berthier and Yves Bocktaels and M{\'{e}}lanie Favre and Herv{\'{e}} Chabanne}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side channel analysis on an embedded hardware fingerprint biometric comparator {\&} low cost countermeasures}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {6:1--6:6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611771}, doi = {10.1145/2611765.2611771}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/ChoutaGDBBBFC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/DhawanVRCSKPD14, author = {Udit Dhawan and Nikos Vasilakis and Raphael Rubin and Silviu Chiricescu and Jonathan M. Smith and Thomas F. Knight Jr. and Benjamin C. Pierce and Andr{\'{e}} DeHon}, editor = {Ruby B. Lee and Weidong Shi}, title = {{PUMP:} a programmable unit for metadata processing}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {8:1--8:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611773}, doi = {10.1145/2611765.2611773}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/DhawanVRCSKPD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/FerrettiMM14, author = {Claudio Ferretti and Silvia Mella and Filippo Melzani}, editor = {Ruby B. Lee and Weidong Shi}, title = {The role of the fault model in {DFA} against {AES}}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611769}, doi = {10.1145/2611765.2611769}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/FerrettiMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/GunduSSPJBT14, author = {Akhila Gundu and Gita Sreekumar and Ali Shafiee and Seth H. Pugsley and Hardik B. Jain and Rajeev Balasubramonian and Mohit Tiwari}, editor = {Ruby B. Lee and Weidong Shi}, title = {Memory bandwidth reservation in the cloud to avoid information leakage in the memory controller}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {11:1--11:5}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611776}, doi = {10.1145/2611765.2611776}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/GunduSSPJBT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/KazdagliHRT14, author = {Mikhail Kazdagli and Ling Huang and Vijay Janapa Reddi and Mohit Tiwari}, editor = {Ruby B. Lee and Weidong Shi}, title = {Morpheus: benchmarking computational diversity in mobile malware}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {3:1--3:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611767}, doi = {10.1145/2611765.2611767}, timestamp = {Mon, 18 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/KazdagliHRT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/SwamySLFK14, author = {Tushar Swamy and Neel Shah and Pei Luo and Yunsi Fei and David R. Kaeli}, editor = {Ruby B. Lee and Weidong Shi}, title = {Scalable and efficient implementation of correlation power analysis using graphics processing units (GPUs)}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {10:1--10:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611775}, doi = {10.1145/2611765.2611775}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/SwamySLFK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/SzeferB14, author = {Jakub Szefer and Sebastian Biedermann}, editor = {Ruby B. Lee and Weidong Shi}, title = {Towards fast hardware memory integrity checking with skewed Merkle trees}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {9:1--9:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611774}, doi = {10.1145/2611765.2611774}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/SzeferB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/XuSD14, author = {Lei Xu and Weidong Shi and Nicholas DeSalvo}, editor = {Ruby B. Lee and Weidong Shi}, title = {Seasoning effect based side channel attacks to {AES} implementation with phase change memory}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {5:1--5:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611770}, doi = {10.1145/2611765.2611770}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/XuSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/YueRWC14, author = {Mengchao Yue and William H. Robinson and Lanier A. Watkins and Cherita L. Corbett}, editor = {Ruby B. Lee and Weidong Shi}, title = {Constructing timing-based covert channels in mobile networks by adjusting {CPU} frequency}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {2:1--2:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611768}, doi = {10.1145/2611765.2611768}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/YueRWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2014hasp, editor = {Ruby B. Lee and Weidong Shi}, title = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765}, doi = {10.1145/2611765}, isbn = {978-1-4503-2777-0}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/2014hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/BhattacharyaRM13, author = {Sarani Bhattacharya and Chester Rebeiro and Debdeep Mukhopadhyay}, editor = {Ruby B. Lee and Weidong Shi}, title = {Unraveling timewarp: what all the fuzz is about?}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {8}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487734}, doi = {10.1145/2487726.2487734}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/BhattacharyaRM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/CarletG13, author = {Claude Carlet and Sylvain Guilley}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side-channel indistinguishability}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {9}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487735}, doi = {10.1145/2487726.2487735}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/CarletG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/CherifDLMB13, author = {Zouha Cherif and Jean{-}Luc Danger and Florent Lozach and Yves Mathieu and Lilian Bossuet}, editor = {Ruby B. Lee and Weidong Shi}, title = {Evaluation of delay PUFs on {CMOS} 65 nm technology: {ASIC} vs {FPGA}}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {4}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487730}, doi = {10.1145/2487726.2487730}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/CherifDLMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/GeWLK13, author = {Shizun Ge and Zhen Wang and Pei Luo and Mark G. Karpovsky}, editor = {Ruby B. Lee and Weidong Shi}, title = {Secure memories resistant to both random errors and fault injection attacks using nonlinear error correction codes}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {5}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487731}, doi = {10.1145/2487726.2487731}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/GeWLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/HoekstraLPPC13, author = {Matthew Hoekstra and Reshma Lal and Pradeep Pappachan and Vinay Phegade and Juan del Cuvillo}, editor = {Ruby B. Lee and Weidong Shi}, title = {Using innovative instructions to create trustworthy software solutions}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {11}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2488370}, doi = {10.1145/2487726.2488370}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/HoekstraLPPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/LiuL13, author = {Fangfei Liu and Ruby B. Lee}, editor = {Ruby B. Lee and Weidong Shi}, title = {Security testing of a secure cache design}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {3}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487729}, doi = {10.1145/2487726.2487729}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/LiuL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/McKeenABRSSS13, author = {Frank McKeen and Ilya Alexandrovich and Alex Berenzon and Carlos V. Rozas and Hisham Shafi and Vedvyas Shanbhogue and Uday R. Savagaonkar}, editor = {Ruby B. Lee and Weidong Shi}, title = {Innovative instructions and software model for isolated execution}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {10}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2488368}, doi = {10.1145/2487726.2488368}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/McKeenABRSSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/MuehlberghuberGKDH13, author = {Michael Muehlberghuber and Frank K. G{\"{u}}rkaynak and Thomas Korak and Philipp Dunst and Michael Hutter}, editor = {Ruby B. Lee and Weidong Shi}, title = {Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual {ASIC}}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {1}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487727}, doi = {10.1145/2487726.2487727}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/MuehlberghuberGKDH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/OrenWW13, author = {Yossef Oren and Ofir Weisse and Avishai Wool}, editor = {Ruby B. Lee and Weidong Shi}, title = {Practical template-algebraic side channel attacks with extremely low data complexity}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {7}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487733}, doi = {10.1145/2487726.2487733}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/OrenWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/SantosF13, author = {Juan Carlos Mart{\'{\i}}nez Santos and Yunsi Fei}, editor = {Ruby B. Lee and Weidong Shi}, title = {Micro-architectural support for metadata coherence in multi-core dynamic information flow tracking}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {6}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487732}, doi = {10.1145/2487726.2487732}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/SantosF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ZhangLCL13, author = {Tianwei Zhang and Fangfei Liu and Si Chen and Ruby B. Lee}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side channel vulnerability metrics: the promise and the pitfalls}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487728}, doi = {10.1145/2487726.2487728}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/ZhangLCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2013hasp, editor = {Ruby B. Lee and Weidong Shi}, title = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726}, doi = {10.1145/2487726}, isbn = {978-1-4503-2118-1}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/2013hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.