default search action
Search dblp for Publications
export results for "stream:conf/hasp:"
@inproceedings{DBLP:conf/hasp/0002KAHJ23, author = {Karthik Ganesan and Viktor Karyofyllis and Julianne Attai and Ahmed Hamoda and Natalie Enright Jerger}, title = {{DINAR:} Enabling Distribution Agnostic Noise Injection in Machine Learning Hardware}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {38--46}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623665}, doi = {10.1145/3623652.3623665}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/0002KAHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/Banerjee23, author = {Sarbartha Banerjee}, title = {Triton: Software-Defined Threat Model for Secure Multi-Tenant {ML} Inference Accelerators}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {19--28}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623672}, doi = {10.1145/3623652.3623672}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/Banerjee23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/BrunHOS23, author = {L{\'{e}}lio Brun and Ichiro Hasuo and Yasushi Ono and Taro Sekiyama}, title = {Automated Security Analysis for Real-World IoT Devices}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {29--37}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623667}, doi = {10.1145/3623652.3623667}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/BrunHOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/ChiuX23, author = {Tinghung Chiu and Wenjie Xiong}, title = {SoK: Fault Injection Attacks on Cryptosystems}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {64--72}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623671}, doi = {10.1145/3623652.3623671}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/ChiuX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/Das23, author = {Subrata Das}, title = {SoK: {A} First Order Survey of Quantum Supply Dynamics and Threat Landscapes}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {82--90}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623664}, doi = {10.1145/3623652.3623664}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/Das23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/ForcioliDC23, author = {Quentin Forcioli and Jean{-}Luc Danger and Sumanta Chaudhuri}, title = {A gem5 based Platform for Micro-Architectural Security Analysis}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {91--99}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623674}, doi = {10.1145/3623652.3623674}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/ForcioliDC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/LalAJ23, author = {Reshma Lal and James B. Anderson and Andrew Jackson}, title = {Data Processing Unit's Entry into Confidential Computing}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {56--63}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623670}, doi = {10.1145/3623652.3623670}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/LalAJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/LiuR023, author = {William Liu and Joseph Ravichandran and Mengjia Yan}, title = {EntryBleed: {A} Universal {KASLR} Bypass against {KPTI} on Linux}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {10--18}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623669}, doi = {10.1145/3623652.3623669}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/LiuR023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/OrieroKS23, author = {Enahoro Oriero and Faiq Khalid and Syed Rafay Hasan}, title = {DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {47--55}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623673}, doi = {10.1145/3623652.3623673}, timestamp = {Sat, 27 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/OrieroKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/Ozga23, author = {Wojciech Ozga}, title = {Towards a Formally Verified Security Monitor for VM-based Confidential Computing}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {73--81}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623668}, doi = {10.1145/3623652.3623668}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/Ozga23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/RyanGS23, author = {Kaki Ryan and Matthew Gregoire and Cynthia Sturton}, title = {{SEIF:} Augmented Symbolic Execution for Information Flow in Hardware Designs}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {1--9}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623666}, doi = {10.1145/3623652.3623666}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/RyanGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hasp/2023, title = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652}, doi = {10.1145/3623652}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/BiringaBK22, author = {Chidera Biringa and Gaspard Baye and G{\"{o}}khan Kul}, title = {Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks}, booktitle = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, pages = {53--57}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562.3569589}, doi = {10.1145/3569562.3569589}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hasp/BiringaBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/Bisheh-NiasarAA22, author = {Mojtaba Bisheh{-}Niasar and Mila Anastasova and Abubakr Abdulgadir and Hwajeong Seo and Reza Azarderakhsh}, title = {Side-Channel Analysis and Countermeasure Design for Implementation of Curve448 on Cortex-M4}, booktitle = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, pages = {10--17}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562.3569564}, doi = {10.1145/3569562.3569564}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hasp/Bisheh-NiasarAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/ChenAK22, author = {Xiaoyue Chen and Pavlos Aimoniotis and Stefanos Kaxiras}, title = {Clueless: {A} Tool Characterising Values Leaking as Addresses}, booktitle = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, pages = {27--34}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562.3569566}, doi = {10.1145/3569562.3569566}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hasp/ChenAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/KucukMMMA22, author = {Kubilay Ahmet K{\"{u}}{\c{c}}{\"{u}}k and Steve Moyle and Andrew Martin and Alexandru Mereacre and Nicholas Allott}, title = {SoK: How Not to Architect Your Next-Generation {TEE} Malware?}, booktitle = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, pages = {35--44}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562.3569568}, doi = {10.1145/3569562.3569568}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/KucukMMMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/Naseredini0SX22, author = {Amir Naseredini and Martin Berger and Matteo Sammartino and Shale Xiong}, title = {{ALARM:} Active LeArning of Rowhammer Mitigations}, booktitle = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, pages = {1--9}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562.3569563}, doi = {10.1145/3569562.3569563}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hasp/Naseredini0SX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/SchillingNUM22, author = {Robert Schilling and Pascal Nasahl and Martin Unterguggenberger and Stefan Mangard}, title = {{SFP:} Providing System Call Flow Protection against Software and Fault Attacks}, booktitle = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, pages = {18--26}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562.3569565}, doi = {10.1145/3569562.3569565}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hasp/SchillingNUM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/UpadhyayG22, author = {Suryansh Upadhyay and Swaroop Ghosh}, title = {Robust and Secure Hybrid Quantum-Classical Computation on Untrusted Cloud-Based Quantum Hardware}, booktitle = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, pages = {45--52}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562.3569569}, doi = {10.1145/3569562.3569569}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hasp/UpadhyayG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hasp/2022, title = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562}, doi = {10.1145/3569562}, isbn = {978-1-4503-9871-8}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hasp/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/0004JL21, author = {Tianwei Zhang and Jakub Szefer and Ruby B. Lee}, title = {Practical and Scalable Security Verification of Secure Architectures}, booktitle = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, pages = {2:1--2:9}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253.3505256}, doi = {10.1145/3505253.3505256}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/0004JL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/ChoudhuryTF21, author = {Muhtadi Choudhury and Shahin Tajik and Domenic Forte}, title = {{SPARSE:} Spatially Aware {LFI} Resilient State Machine Encoding}, booktitle = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253.3505254}, doi = {10.1145/3505253.3505254}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/ChoudhuryTF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/LiDS21, author = {Allen Mi and Shuwen Deng and Jakub Szefer}, title = {Short Paper: Device- and Locality-Specific Fingerprinting of Shared {NISQ} Quantum Computers}, booktitle = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, pages = {7:1--7:6}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253.3505261}, doi = {10.1145/3505253.3505261}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/LiDS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/LiHRLNCZ21, author = {Haonan Li and Weijie Huang and Mingde Ren and Hongyi Lu and Zhenyu Ning and Heming Cui and Fengwei Zhang}, title = {A Novel Memory Management for {RISC-V} Enclaves}, booktitle = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, pages = {3:1--3:9}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253.3505257}, doi = {10.1145/3505253.3505257}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/LiHRLNCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/MohammedKSCH21, author = {Hawzhin Mohammed and Faiq Khalid and Paul Sawyer and Gabriella Cataloni and Syed Rafay Hasan}, title = {InTrust-IoT: Intelligent Ecosystem based on Power Profiling of Trusted device(s) in IoT for Hardware Trojan Detection}, booktitle = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, pages = {8:1--8:8}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253.3505262}, doi = {10.1145/3505253.3505262}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/MohammedKSCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/ShiXCZG21, author = {Rabimba Karanjai and Weidong Shi and Lei Xu and Lin Chen and Fengwei Zhang and Zhimin Gao}, title = {Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research}, booktitle = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, pages = {5:1--5:8}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253.3505259}, doi = {10.1145/3505253.3505259}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/ShiXCZG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/SureshAATG21, author = {Aakarshitha Suresh and Abdullah Ash{-}Saki and Mahababul Alam and Rasit Onur Topaloglu and Swaroop Ghosh}, title = {Short Paper: {A} Quantum Circuit Obfuscation Methodology for Security and Privacy}, booktitle = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, pages = {6:1--6:5}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253.3505260}, doi = {10.1145/3505253.3505260}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/SureshAATG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/YoshidaSF21, author = {Kota Yoshida and Kuniyasu Suzaki and Takeshi Fujino}, title = {Towards Trusted IoT Sensing Systems: Implementing {PUF} as Secure Key Generator for Root of Trust and Message Authentication Code}, booktitle = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253.3505258}, doi = {10.1145/3505253.3505258}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/YoshidaSF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/micro/2021hasp, title = {{HASP} '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3505253}, doi = {10.1145/3505253}, isbn = {978-1-4503-9614-1}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/2021hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/DangwalCALRT20, author = {Deeksha Dangwal and Meghan Cowan and Armin Alaghi and Vincent T. Lee and Brandon Reagen and Caroline Trippel}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {8:1--8:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458911}, doi = {10.1145/3458903.3458911}, timestamp = {Tue, 26 Oct 2021 15:43:33 +0200}, biburl = {https://dblp.org/rec/conf/micro/DangwalCALRT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/DelgadoVK20, author = {Brian Delgado and Tejaswini Vibhute and Karen L. Karavanic}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Applying the Principle of Least Privilege to System Management Interrupt Handlers with the Intel {SMI} Transfer Monitor}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {4:1--4:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458907}, doi = {10.1145/3458903.3458907}, timestamp = {Tue, 26 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/DelgadoVK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/Hu0L20, author = {Guangyuan Hu and Tianwei Zhang and Ruby B. Lee}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {6:1--6:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458909}, doi = {10.1145/3458903.3458909}, timestamp = {Tue, 26 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/Hu0L20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/Koteshwara0P20, author = {Sandhya Koteshwara and Manoj Kumar and Pratap Pattnaik}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Analysis and Hardware Optimization of Lattice Post-Quantum Cryptography Workloads}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {2:1--2:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458905}, doi = {10.1145/3458903.3458905}, timestamp = {Tue, 26 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/Koteshwara0P20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/MarkettosBBNMW20, author = {A. Theodore Markettos and John Baldwin and Ruslan Bukin and Peter G. Neumann and Simon W. Moore and Robert N. M. Watson}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Position Paper: Defending Direct Memory Access with {CHERI} Capabilities}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {7:1--7:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458910}, doi = {10.1145/3458903.3458910}, timestamp = {Tue, 26 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/MarkettosBBNMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/MarshallPP20, author = {Ben Marshall and Daniel Page and Thinh Hung Pham}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Implementing the Draft {RISC-V} Scalar Cryptography Extensions}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458904}, doi = {10.1145/3458903.3458904}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/MarshallPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/MoraitisD20, author = {Michail Moraitis and Elena Dubrova}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {{FPGA} Bitstream Modification with Interconnect in Mind}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {5:1--5:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458908}, doi = {10.1145/3458903.3458908}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/MoraitisD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/StrupeK20, author = {Fredrik Strupe and Rakesh Kumar}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Uncovering Hidden Instructions in Armv8-A Implementations}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {3:1--3:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458906}, doi = {10.1145/3458903.3458906}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/StrupeK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/micro/2020hasp, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903}, doi = {10.1145/3458903}, isbn = {978-1-4503-8898-6}, timestamp = {Tue, 26 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/2020hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/0056019, author = {Xin Wang and Wei Zhang}, title = {Cracking Randomized Coalescing Techniques with An Efficient Profiling-Based Side-Channel Attack to {GPU}}, booktitle = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, pages = {2:1--2:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167.3337169}, doi = {10.1145/3337167.3337169}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/0056019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ChakrabartiHKV19, author = {Somnath Chakrabarti and Matthew Hoekstra and Dmitrii Kuvaiskii and Mona Vij}, title = {Scaling Intel{\textregistered} Software Guard Extensions Applications with Intel{\textregistered} {SGX} Card}, booktitle = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, pages = {6:1--6:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167.3337173}, doi = {10.1145/3337167.3337173}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/ChakrabartiHKV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/DengG0SGLDS19, author = {Shuwen Deng and Doguhan G{\"{u}}m{\"{u}}soglu and Wenjie Xiong and Sercan Sari and Y. Serhan Gener and Corine Lu and Onur Demir and Jakub Szefer}, title = {SecChisel Framework for Security Verification of Secure Processor Architectures}, booktitle = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, pages = {7:1--7:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167.3337174}, doi = {10.1145/3337167.3337174}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/DengG0SGLDS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/DisselkoenRWGLS19, author = {Craig Disselkoen and John Renner and Conrad Watt and Tal Garfinkel and Amit Levy and Deian Stefan}, title = {Position Paper: Progressive Memory Safety for WebAssembly}, booktitle = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167.3337171}, doi = {10.1145/3337167.3337171}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/DisselkoenRWGLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ShanbhogueGS19, author = {Vedvyas Shanbhogue and Deepak Gupta and Ravi Sahita}, title = {Security Analysis of Processor Instruction Set Architecture for Enforcing Control-Flow Integrity}, booktitle = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, pages = {8:1--8:11}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167.3337175}, doi = {10.1145/3337167.3337175}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/ShanbhogueGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ShimizuTJP19, author = {Atsuko Shimizu and Daniel Townley and Mohit Joshi and Dmitry Ponomarev}, title = {{EA-PLRU:} Enclave-Aware Cache Replacement}, booktitle = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, pages = {5:1--5:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167.3337172}, doi = {10.1145/3337167.3337172}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/ShimizuTJP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/TMPD19, author = {Santhosh Kumar T and Debadatta Mishra and Biswabandan Panda and Nayan Deshmukh}, title = {CoWLight: Hardware Assisted Copy-on-Write Fault Handling for Secure Deduplication}, booktitle = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, pages = {3:1--3:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167.3337170}, doi = {10.1145/3337167.3337170}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/TMPD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/TorresYBBL19, author = {Gildo Torres and Zhiliu Yang and Zander Blasingame and James Bruska and Chen Liu}, title = {Detecting Non-Control-Flow Hijacking Attacks Using Contextual Execution Information}, booktitle = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167.3337168}, doi = {10.1145/3337167.3337168}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/TorresYBBL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2019hasp, title = {Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3337167}, doi = {10.1145/3337167}, isbn = {978-1-4503-7226-8}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/2019hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/DengXS18, author = {Shuwen Deng and Wenjie Xiong and Jakub Szefer}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Cache timing side-channel vulnerability checking with computation tree logic}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {2:1--2:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214294}, doi = {10.1145/3214292.3214294}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/DengXS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/DongSCCD18, author = {Xiaowan Dong and Zhuojia Shen and John Criswell and Alan L. Cox and Sandhya Dwarkadas}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Spectres, virtual ghosts, and hardware support}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {5:1--5:9}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214297}, doi = {10.1145/3214292.3214297}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/DongSCCD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/KhanG18, author = {Mohammad Nasim Imtiaz Khan and Swaroop Ghosh}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Fault injection attacks on emerging non-volatile memory and countermeasures}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {10:1--10:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214302}, doi = {10.1145/3214292.3214302}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/KhanG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/Lowe-PowerAFKN18, author = {Jason Lowe{-}Power and Venkatesh Akella and Matthew K. Farrens and Samuel T. King and Christopher J. Nitta}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {A case for exposing extra-architectural state in the {ISA:} position paper}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {8:1--8:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214300}, doi = {10.1145/3214292.3214300}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/Lowe-PowerAFKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/MofradZLS18, author = {Saeid Mofrad and Fengwei Zhang and Shiyong Lu and Weidong Shi}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {A comparison study of intel {SGX} and {AMD} memory encryption technology}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {9:1--9:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214301}, doi = {10.1145/3214292.3214301}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/MofradZLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/MushtaqABCLG18, author = {Maria Mushtaq and Ayaz Akram and Muhammad Khurram Bhatti and Maham Chaudhry and Vianney Lapotre and Guy Gogniat}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {NIGHTs-WATCH: a cache-based side-channel intrusion detector using hardware performance counters}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214293}, doi = {10.1145/3214292.3214293}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/MushtaqABCLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/PetersLVPK18, author = {Travis Peters and Reshma Lal and Srikanth Varadarajan and Pradeep Pappachan and David Kotz}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {{BASTION-SGX:} bluetooth and architectural support for trusted {I/O} on {SGX}}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {3:1--3:9}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214295}, doi = {10.1145/3214292.3214295}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/PetersLVPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/VigLBM18, author = {Saru Vig and Siew{-}Kei Lam and Sarani Bhattacharya and Debdeep Mukhopadhyay}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Rapid detection of rowhammer attacks using dynamic skewed hash tree}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {7:1--7:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214299}, doi = {10.1145/3214292.3214299}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/VigLBM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/VuongSTB18, author = {Andrew Vuong and Ali Shafiee and Meysam Taassori and Rajeev Balasubramonian}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {An MLP-aware leakage-free memory controller}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {4:1--4:7}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214296}, doi = {10.1145/3214292.3214296}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/VuongSTB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/WongHC18, author = {Ming Ming Wong and Jawad Haj{-}Yahya and Anupam Chattopadhyay}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {{SMARTS:} secure memory assurance of {RISC-V} trusted SoC}, booktitle = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, pages = {6:1--6:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292.3214298}, doi = {10.1145/3214292.3214298}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/WongHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2018hasp, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3214292}, doi = {10.1145/3214292}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/2018hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/AriasSJ17, author = {Orlando Arias and Dean Sullivan and Yier Jin}, title = {HA2lloc: Hardware-Assisted Secure Allocator}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {8:1--8:7}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092635}, doi = {10.1145/3092627.3092635}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/AriasSJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ChakrabartiLVMR17, author = {Somnath Chakrabarti and Rebekah Leslie{-}Hurd and Mona Vij and Frank McKeen and Carlos V. Rozas and Dror Caspi and Ilya Alexandrovich and Ittai Anati}, title = {Intel{\textregistered} Software Guard Extensions (Intel{\textregistered} {SGX)} Architecture for Oversubscription of Secure Memory in a Virtualized Environment}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {7:1--7:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092634}, doi = {10.1145/3092627.3092634}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/ChakrabartiLVMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/GhoshMZS17, author = {Santosh Ghosh and Rafael Misoczki and Li Zhao and Manoj R. Sastry}, title = {Lightweight Block Cipher Circuits for Automotive and IoT Sensor Devices}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {5:1--5:7}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092632}, doi = {10.1145/3092627.3092632}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/GhoshMZS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/MenonMRGV17, author = {Arjun Menon and Subadra Murugan and Chester Rebeiro and Neel Gala and Kamakoti Veezhinathan}, title = {Shakti-T: {A} {RISC-V} Processor with Light Weight Security Extensions}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {2:1--2:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092629}, doi = {10.1145/3092627.3092629}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/MenonMRGV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/NingZSS17, author = {Zhenyu Ning and Fengwei Zhang and Weisong Shi and Weidong Shi}, title = {Position Paper: Challenges Towards Securing Hardware-assisted Execution Environments}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {6:1--6:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092633}, doi = {10.1145/3092627.3092633}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/NingZSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ShwartzB17, author = {Ofir Shwartz and Yitzhak Birk}, title = {SeM: {A} {CPU} Architecture Extension for Secure Remote Computing}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092631}, doi = {10.1145/3092627.3092631}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/ShwartzB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/YuK17, author = {Weize Yu and Sel{\c{c}}uk K{\"{o}}se}, title = {A Lightweight {AES} Implementation Against Bivariate First-Order {DPA} Attacks}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {1:1--1:7}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092628}, doi = {10.1145/3092627.3092628}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/YuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ZhangL17, author = {Tianwei Zhang and Ruby B. Lee}, title = {Host-Based Dos Attacks and Defense in the Cloud}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {3:1--3:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092630}, doi = {10.1145/3092627.3092630}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/ZhangL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2017hasp, title = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627}, doi = {10.1145/3092627}, isbn = {978-1-4503-5266-6}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/2017hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/AzrielGGM16, author = {Leonid Azriel and Ran Ginosar and Shay Gueron and Avi Mendelson}, title = {Using Scan Side Channel for Detecting {IP} Theft}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948619}, doi = {10.1145/2948618.2948619}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/AzrielGGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/BhattacharyaRM16, author = {Sarani Bhattacharya and Chester Rebeiro and Debdeep Mukhopadhyay}, title = {A Formal Security Analysis of Even-Odd Sequential Prefetching in Profiled Cache-Timing Attacks}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {6:1--6:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948624}, doi = {10.1145/2948618.2948624}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/BhattacharyaRM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/CheriseyGRJ16, author = {Eloi de Ch{\'{e}}risey and Sylvain Guilley and Olivier Rioul and Darshana Jayasinghe}, title = {Template Attacks with Partial Profiles and Dirichlet Priors: Application to Timing Attacks}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {7:1--7:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948625}, doi = {10.1145/2948618.2948625}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/CheriseyGRJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/LeeL16, author = {Wei{-}Han Lee and Ruby B. Lee}, title = {Implicit Sensor-based Authentication of Smartphone Users with Smartwatch}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {9:1--9:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948627}, doi = {10.1145/2948618.2948627}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/LeeL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/McKeenAACJLR16, author = {Frank McKeen and Ilya Alexandrovich and Ittai Anati and Dror Caspi and Simon Johnson and Rebekah Leslie{-}Hurd and Carlos V. Rozas}, title = {Intel{\textregistered} Software Guard Extensions (Intel{\textregistered} {SGX)} Support for Dynamic Memory Management Inside an Enclave}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {10:1--10:9}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2954331}, doi = {10.1145/2948618.2954331}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/McKeenAACJLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/MoonLHJSP16, author = {Hyungon Moon and Jinyong Lee and Dongil Hwang and Seonhwa Jung and Jiwon Seo and Yunheung Paek}, title = {Architectural Supports to Protect {OS} Kernels from Code-Injection Attacks}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {5:1--5:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948623}, doi = {10.1145/2948618.2948623}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/MoonLHJSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/RawatS16, author = {Hemendra K. Rawat and Patrick Schaumont}, title = {{SIMD} Instruction Set Extensions for Keccak with Applications to SHA-3, Keyak and Ketje}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948622}, doi = {10.1145/2948618.2948622}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/RawatS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/TorresL16, author = {Gildo Torres and Chen Liu}, title = {Can Data-Only Exploits be Detected at Runtime Using Hardware Events?: {A} Case Study of the Heartbleed Vulnerability}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {2:1--2:7}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948620}, doi = {10.1145/2948618.2948620}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/TorresL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/XingSL16, author = {Bin Cedric Xing and Mark Shanahan and Rebekah Leslie{-}Hurd}, title = {Intel{\textregistered} Software Guard Extensions (Intel{\textregistered} {SGX)} Software Support for Dynamic Memory Allocation inside an Enclave}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {11:1--11:9}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2954330}, doi = {10.1145/2948618.2954330}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/XingSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/YuceGDPNS16, author = {Bilgiday Yuce and Nahid Farhady Ghalaty and Chinmay Deshpande and Conor Patrick and Leyla Nazhandali and Patrick Schaumont}, title = {{FAME:} Fault-attack Aware Microprocessor Extensions for Hardware Fault Detection and Software Fault Response}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {8:1--8:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948626}, doi = {10.1145/2948618.2948626}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/YuceGDPNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ZhangZ16, author = {Fengwei Zhang and Hongwei Zhang}, title = {SoK: {A} Study of Using Hardware-assisted Isolated Execution Environments for Security}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {3:1--3:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948621}, doi = {10.1145/2948618.2948621}, timestamp = {Thu, 25 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/ZhangZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2016hasp, title = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618}, doi = {10.1145/2948618}, isbn = {978-1-4503-4769-3}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/2016hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/AhmadHHDK15, author = {Masab Ahmad and Syed Kamran Haider and Farrukh Hijaz and Marten van Dijk and Omer Khan}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Exploring the performance implications of memory safety primitives in many-core processors executing multi-threaded workloads}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {6:1--6:8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768572}, doi = {10.1145/2768566.2768572}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/AhmadHHDK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/DeTranoGGKK15, author = {Alexander DeTrano and Sylvain Guilley and Xiaofei Guo and Naghmeh Karimi and Ramesh Karri}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Exploiting small leakages in masks to turn a second-order attack into a first-order attack}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {7:1--7:5}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768573}, doi = {10.1145/2768566.2768573}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/DeTranoGGKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/El-HadedyS15, author = {Mohamed El{-}Hadedy and Kevin Skadron}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Hardware overhead analysis of programmability in {ARX} crypto processing}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {8:1--8:4}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768574}, doi = {10.1145/2768566.2768574}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/El-HadedyS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/EvtyushkinPG15, author = {Dmitry Evtyushkin and Dmitry V. Ponomarev and Nael B. Abu{-}Ghazaleh}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Covert channels through branch predictors: a feasibility study}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {5:1--5:8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768571}, doi = {10.1145/2768566.2768571}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/EvtyushkinPG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/JapSB15, author = {Dirmanto Jap and Marc St{\"{o}}ttinger and Shivam Bhasin}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Support vector regression: exploiting machine learning techniques for leakage modeling}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {2:1--2:8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768568}, doi = {10.1145/2768566.2768568}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/JapSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/LeeHHKP15, author = {Yongje Lee and Ingoo Heo and Dongil Hwang and Kyungmin Kim and Yunheung Paek}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Towards a practical solution to detect code reuse attacks on {ARM} mobile devices}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {3:1--3:8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768569}, doi = {10.1145/2768566.2768569}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/LeeHHKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/LiuWL15, author = {Fangfei Liu and Hao Wu and Ruby B. Lee}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Can randomized mapping secure instruction caches from side-channel attacks?}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768570}, doi = {10.1145/2768566.2768570}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/LiuWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/LuoFFDKL15, author = {Pei Luo and Yunsi Fei and Xin Fang and A. Adam Ding and David R. Kaeli and Miriam Leeser}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Side-channel analysis of MAC-Keccak hardware implementations}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768567}, doi = {10.1145/2768566.2768567}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/LuoFFDKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/NomaniS15, author = {Junaid Nomani and Jakub Szefer}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Predicting program phases and defending against side-channel attacks using hardware performance counters}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {9:1--9:4}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768575}, doi = {10.1145/2768566.2768575}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/NomaniS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/OuaarabDP15, author = {Salaheddine Ouaarab and Guillaume Duc and Renaud Pacalet}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Performance optimizations of integrity checking based on Merkle trees}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {10:1--10:4}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768576}, doi = {10.1145/2768566.2768576}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/OuaarabDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2015hasp, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566}, doi = {10.1145/2768566}, isbn = {978-1-4503-3483-9}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/2015hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/0020V14, author = {Jie Chen and Guru Venkataramani}, editor = {Ruby B. Lee and Weidong Shi}, title = {An algorithm for detecting contention-based covert timing channels on shared hardware}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611766}, doi = {10.1145/2611765.2611766}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/0020V14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/BhasinDGN14, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side-channel leakage and trace compression using normalized inter-class variance}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {7:1--7:9}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611772}, doi = {10.1145/2611765.2611772}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/BhasinDGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ChoutaGDBBBFC14, author = {Taoufik Chouta and Tarik Graba and Jean{-}Luc Danger and Julien Bringer and Ma{\"{e}}l Berthier and Yves Bocktaels and M{\'{e}}lanie Favre and Herv{\'{e}} Chabanne}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side channel analysis on an embedded hardware fingerprint biometric comparator {\&} low cost countermeasures}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {6:1--6:6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611771}, doi = {10.1145/2611765.2611771}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/ChoutaGDBBBFC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/DhawanVRCSKPD14, author = {Udit Dhawan and Nikos Vasilakis and Raphael Rubin and Silviu Chiricescu and Jonathan M. Smith and Thomas F. Knight Jr. and Benjamin C. Pierce and Andr{\'{e}} DeHon}, editor = {Ruby B. Lee and Weidong Shi}, title = {{PUMP:} a programmable unit for metadata processing}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {8:1--8:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611773}, doi = {10.1145/2611765.2611773}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/DhawanVRCSKPD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/FerrettiMM14, author = {Claudio Ferretti and Silvia Mella and Filippo Melzani}, editor = {Ruby B. Lee and Weidong Shi}, title = {The role of the fault model in {DFA} against {AES}}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611769}, doi = {10.1145/2611765.2611769}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/FerrettiMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/GunduSSPJBT14, author = {Akhila Gundu and Gita Sreekumar and Ali Shafiee and Seth H. Pugsley and Hardik B. Jain and Rajeev Balasubramonian and Mohit Tiwari}, editor = {Ruby B. Lee and Weidong Shi}, title = {Memory bandwidth reservation in the cloud to avoid information leakage in the memory controller}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {11:1--11:5}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611776}, doi = {10.1145/2611765.2611776}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/GunduSSPJBT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/KazdagliHRT14, author = {Mikhail Kazdagli and Ling Huang and Vijay Janapa Reddi and Mohit Tiwari}, editor = {Ruby B. Lee and Weidong Shi}, title = {Morpheus: benchmarking computational diversity in mobile malware}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {3:1--3:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611767}, doi = {10.1145/2611765.2611767}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/KazdagliHRT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/SwamySLFK14, author = {Tushar Swamy and Neel Shah and Pei Luo and Yunsi Fei and David R. Kaeli}, editor = {Ruby B. Lee and Weidong Shi}, title = {Scalable and efficient implementation of correlation power analysis using graphics processing units (GPUs)}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {10:1--10:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611775}, doi = {10.1145/2611765.2611775}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/SwamySLFK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/SzeferB14, author = {Jakub Szefer and Sebastian Biedermann}, editor = {Ruby B. Lee and Weidong Shi}, title = {Towards fast hardware memory integrity checking with skewed Merkle trees}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {9:1--9:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611774}, doi = {10.1145/2611765.2611774}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/SzeferB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/XuSD14, author = {Lei Xu and Weidong Shi and Nicholas DeSalvo}, editor = {Ruby B. Lee and Weidong Shi}, title = {Seasoning effect based side channel attacks to {AES} implementation with phase change memory}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {5:1--5:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611770}, doi = {10.1145/2611765.2611770}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/XuSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/YueRWC14, author = {Mengchao Yue and William H. Robinson and Lanier A. Watkins and Cherita L. Corbett}, editor = {Ruby B. Lee and Weidong Shi}, title = {Constructing timing-based covert channels in mobile networks by adjusting {CPU} frequency}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {2:1--2:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611768}, doi = {10.1145/2611765.2611768}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/YueRWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2014hasp, editor = {Ruby B. Lee and Weidong Shi}, title = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765}, doi = {10.1145/2611765}, isbn = {978-1-4503-2777-0}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/2014hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/BhattacharyaRM13, author = {Sarani Bhattacharya and Chester Rebeiro and Debdeep Mukhopadhyay}, editor = {Ruby B. Lee and Weidong Shi}, title = {Unraveling timewarp: what all the fuzz is about?}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {8}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487734}, doi = {10.1145/2487726.2487734}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/BhattacharyaRM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/CarletG13, author = {Claude Carlet and Sylvain Guilley}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side-channel indistinguishability}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {9}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487735}, doi = {10.1145/2487726.2487735}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/CarletG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/CherifDLMB13, author = {Zouha Cherif and Jean{-}Luc Danger and Florent Lozach and Yves Mathieu and Lilian Bossuet}, editor = {Ruby B. Lee and Weidong Shi}, title = {Evaluation of delay PUFs on {CMOS} 65 nm technology: {ASIC} vs {FPGA}}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {4}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487730}, doi = {10.1145/2487726.2487730}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/CherifDLMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/GeWLK13, author = {Shizun Ge and Zhen Wang and Pei Luo and Mark G. Karpovsky}, editor = {Ruby B. Lee and Weidong Shi}, title = {Secure memories resistant to both random errors and fault injection attacks using nonlinear error correction codes}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {5}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487731}, doi = {10.1145/2487726.2487731}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/GeWLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/HoekstraLPPC13, author = {Matthew Hoekstra and Reshma Lal and Pradeep Pappachan and Vinay Phegade and Juan del Cuvillo}, editor = {Ruby B. Lee and Weidong Shi}, title = {Using innovative instructions to create trustworthy software solutions}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {11}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2488370}, doi = {10.1145/2487726.2488370}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/HoekstraLPPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/LiuL13, author = {Fangfei Liu and Ruby B. Lee}, editor = {Ruby B. Lee and Weidong Shi}, title = {Security testing of a secure cache design}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {3}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487729}, doi = {10.1145/2487726.2487729}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/LiuL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/McKeenABRSSS13, author = {Frank McKeen and Ilya Alexandrovich and Alex Berenzon and Carlos V. Rozas and Hisham Shafi and Vedvyas Shanbhogue and Uday R. Savagaonkar}, editor = {Ruby B. Lee and Weidong Shi}, title = {Innovative instructions and software model for isolated execution}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {10}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2488368}, doi = {10.1145/2487726.2488368}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/McKeenABRSSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/MuehlberghuberGKDH13, author = {Michael Muehlberghuber and Frank K. G{\"{u}}rkaynak and Thomas Korak and Philipp Dunst and Michael Hutter}, editor = {Ruby B. Lee and Weidong Shi}, title = {Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual {ASIC}}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {1}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487727}, doi = {10.1145/2487726.2487727}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/MuehlberghuberGKDH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/OrenWW13, author = {Yossef Oren and Ofir Weisse and Avishai Wool}, editor = {Ruby B. Lee and Weidong Shi}, title = {Practical template-algebraic side channel attacks with extremely low data complexity}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {7}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487733}, doi = {10.1145/2487726.2487733}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/OrenWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/SantosF13, author = {Juan Carlos Mart{\'{\i}}nez Santos and Yunsi Fei}, editor = {Ruby B. Lee and Weidong Shi}, title = {Micro-architectural support for metadata coherence in multi-core dynamic information flow tracking}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {6}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487732}, doi = {10.1145/2487726.2487732}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/SantosF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ZhangLCL13, author = {Tianwei Zhang and Fangfei Liu and Si Chen and Ruby B. Lee}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side channel vulnerability metrics: the promise and the pitfalls}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487728}, doi = {10.1145/2487726.2487728}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/ZhangLCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2013hasp, editor = {Ruby B. Lee and Weidong Shi}, title = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726}, doi = {10.1145/2487726}, isbn = {978-1-4503-2118-1}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/2013hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.