Search dblp for Publications

export results for "toc:db/conf/isca/hasp2019.bht:"

 download as .bib file

@inproceedings{DBLP:conf/isca/0056019,
  author       = {Xin Wang and
                  Wei Zhang},
  title        = {Cracking Randomized Coalescing Techniques with An Efficient Profiling-Based
                  Side-Channel Attack to {GPU}},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {2:1--2:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337169},
  doi          = {10.1145/3337167.3337169},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/0056019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ChakrabartiHKV19,
  author       = {Somnath Chakrabarti and
                  Matthew Hoekstra and
                  Dmitrii Kuvaiskii and
                  Mona Vij},
  title        = {Scaling Intel{\textregistered} Software Guard Extensions Applications
                  with Intel{\textregistered} {SGX} Card},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {6:1--6:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337173},
  doi          = {10.1145/3337167.3337173},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ChakrabartiHKV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/DengG0SGLDS19,
  author       = {Shuwen Deng and
                  Doguhan G{\"{u}}m{\"{u}}soglu and
                  Wenjie Xiong and
                  Sercan Sari and
                  Y. Serhan Gener and
                  Corine Lu and
                  Onur Demir and
                  Jakub Szefer},
  title        = {SecChisel Framework for Security Verification of Secure Processor
                  Architectures},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {7:1--7:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337174},
  doi          = {10.1145/3337167.3337174},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/DengG0SGLDS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/DisselkoenRWGLS19,
  author       = {Craig Disselkoen and
                  John Renner and
                  Conrad Watt and
                  Tal Garfinkel and
                  Amit Levy and
                  Deian Stefan},
  title        = {Position Paper: Progressive Memory Safety for WebAssembly},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337171},
  doi          = {10.1145/3337167.3337171},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/DisselkoenRWGLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ShanbhogueGS19,
  author       = {Vedvyas Shanbhogue and
                  Deepak Gupta and
                  Ravi Sahita},
  title        = {Security Analysis of Processor Instruction Set Architecture for Enforcing
                  Control-Flow Integrity},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {8:1--8:11},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337175},
  doi          = {10.1145/3337167.3337175},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ShanbhogueGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ShimizuTJP19,
  author       = {Atsuko Shimizu and
                  Daniel Townley and
                  Mohit Joshi and
                  Dmitry Ponomarev},
  title        = {{EA-PLRU:} Enclave-Aware Cache Replacement},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {5:1--5:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337172},
  doi          = {10.1145/3337167.3337172},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ShimizuTJP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/TMPD19,
  author       = {Santhosh Kumar T and
                  Debadatta Mishra and
                  Biswabandan Panda and
                  Nayan Deshmukh},
  title        = {CoWLight: Hardware Assisted Copy-on-Write Fault Handling for Secure
                  Deduplication},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {3:1--3:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337170},
  doi          = {10.1145/3337167.3337170},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/TMPD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/TorresYBBL19,
  author       = {Gildo Torres and
                  Zhiliu Yang and
                  Zander Blasingame and
                  James Bruska and
                  Chen Liu},
  title        = {Detecting Non-Control-Flow Hijacking Attacks Using Contextual Execution
                  Information},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337168},
  doi          = {10.1145/3337167.3337168},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/TorresYBBL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2019hasp,
  title        = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167},
  doi          = {10.1145/3337167},
  isbn         = {978-1-4503-7226-8},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/2019hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}