- Allen Mi, Shuwen Deng, Jakub Szefer:
Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers. HASP@MICRO 2021: 7:1-7:6 - Haonan Li, Weijie Huang, Mingde Ren, Hongyi Lu, Zhenyu Ning, Heming Cui, Fengwei Zhang:
A Novel Memory Management for RISC-V Enclaves. HASP@MICRO 2021: 3:1-3:9 - Hawzhin Mohammed, Faiq Khalid, Paul Sawyer, Gabriella Cataloni, Syed Rafay Hasan:
InTrust-IoT: Intelligent Ecosystem based on Power Profiling of Trusted device(s) in IoT for Hardware Trojan Detection. HASP@MICRO 2021: 8:1-8:8 - Rabimba Karanjai, Weidong Shi, Lei Xu, Lin Chen, Fengwei Zhang, Zhimin Gao:
Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research. HASP@MICRO 2021: 5:1-5:8 - Aakarshitha Suresh, Abdullah Ash-Saki, Mahababul Alam, Rasit Onur Topaloglu, Swaroop Ghosh:
Short Paper: A Quantum Circuit Obfuscation Methodology for Security and Privacy. HASP@MICRO 2021: 6:1-6:5 - Kota Yoshida, Kuniyasu Suzaki, Takeshi Fujino:
Towards Trusted IoT Sensing Systems: Implementing PUF as Secure Key Generator for Root of Trust and Message Authentication Code. HASP@MICRO 2021: 4:1-4:8 - HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, Virtual Event, 18 October 2021. ACM 2021, ISBN 978-1-4503-9614-1 [contents]
- 2020
- Deeksha Dangwal, Meghan Cowan, Armin Alaghi, Vincent T. Lee, Brandon Reagen, Caroline Trippel:
SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing. HASP@MICRO 2020: 8:1-8:9 - Brian Delgado, Tejaswini Vibhute, Karen L. Karavanic:
Applying the Principle of Least Privilege to System Management Interrupt Handlers with the Intel SMI Transfer Monitor. HASP@MICRO 2020: 4:1-4:9 - Guangyuan Hu, Tianwei Zhang, Ruby B. Lee:
Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks. HASP@MICRO 2020: 6:1-6:9 - Sandhya Koteshwara, Manoj Kumar, Pratap Pattnaik:
Analysis and Hardware Optimization of Lattice Post-Quantum Cryptography Workloads. HASP@MICRO 2020: 2:1-2:9 - A. Theodore Markettos, John Baldwin, Ruslan Bukin, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson:
Position Paper: Defending Direct Memory Access with CHERI Capabilities. HASP@MICRO 2020: 7:1-7:9 - Ben Marshall, Daniel Page, Thinh Hung Pham:
Implementing the Draft RISC-V Scalar Cryptography Extensions. HASP@MICRO 2020: 1:1-1:8 - Michail Moraitis, Elena Dubrova:
FPGA Bitstream Modification with Interconnect in Mind. HASP@MICRO 2020: 5:1-5:9 - Fredrik Strupe, Rakesh Kumar:
Uncovering Hidden Instructions in Armv8-A Implementations. HASP@MICRO 2020: 3:1-3:9 - Jakub Szefer, Weidong Shi, Ruby B. Lee:
HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020. ACM 2020, ISBN 978-1-4503-8898-6 [contents] - 2019
- Xin Wang, Wei Zhang:
Cracking Randomized Coalescing Techniques with An Efficient Profiling-Based Side-Channel Attack to GPU. HASP@ISCA 2019: 2:1-2:8 - Somnath Chakrabarti, Matthew Hoekstra, Dmitrii Kuvaiskii, Mona Vij:
Scaling Intel® Software Guard Extensions Applications with Intel® SGX Card. HASP@ISCA 2019: 6:1-6:9 - Shuwen Deng, Doguhan Gümüsoglu, Wenjie Xiong, Sercan Sari, Y. Serhan Gener, Corine Lu, Onur Demir, Jakub Szefer:
SecChisel Framework for Security Verification of Secure Processor Architectures. HASP@ISCA 2019: 7:1-7:8 - Craig Disselkoen, John Renner, Conrad Watt, Tal Garfinkel, Amit Levy, Deian Stefan:
Position Paper: Progressive Memory Safety for WebAssembly. HASP@ISCA 2019: 4:1-4:8 - Vedvyas Shanbhogue, Deepak Gupta, Ravi Sahita:
Security Analysis of Processor Instruction Set Architecture for Enforcing Control-Flow Integrity. HASP@ISCA 2019: 8:1-8:11 - Atsuko Shimizu, Daniel Townley, Mohit Joshi, Dmitry Ponomarev:
EA-PLRU: Enclave-Aware Cache Replacement. HASP@ISCA 2019: 5:1-5:8 - Santhosh Kumar T, Debadatta Mishra, Biswabandan Panda, Nayan Deshmukh:
CoWLight: Hardware Assisted Copy-on-Write Fault Handling for Secure Deduplication. HASP@ISCA 2019: 3:1-3:8 - Gildo Torres, Zhiliu Yang, Zander Blasingame, James Bruska, Chen Liu:
Detecting Non-Control-Flow Hijacking Attacks Using Contextual Execution Information. HASP@ISCA 2019: 1:1-1:8 - Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019. ACM 2019, ISBN 978-1-4503-7226-8 [contents]
- 2018
- Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Cache timing side-channel vulnerability checking with computation tree logic. HASP@ISCA 2018: 2:1-2:8 - Xiaowan Dong, Zhuojia Shen, John Criswell, Alan L. Cox, Sandhya Dwarkadas:
Spectres, virtual ghosts, and hardware support. HASP@ISCA 2018: 5:1-5:9 - Mohammad Nasim Imtiaz Khan, Swaroop Ghosh:
Fault injection attacks on emerging non-volatile memory and countermeasures. HASP@ISCA 2018: 10:1-10:8 - Jason Lowe-Power, Venkatesh Akella, Matthew K. Farrens, Samuel T. King, Christopher J. Nitta:
A case for exposing extra-architectural state in the ISA: position paper. HASP@ISCA 2018: 8:1-8:6 - Saeid Mofrad, Fengwei Zhang, Shiyong Lu, Weidong Shi:
A comparison study of intel SGX and AMD memory encryption technology. HASP@ISCA 2018: 9:1-9:8