- Dmitry Evtyushkin
, Dmitry V. Ponomarev, Nael B. Abu-Ghazaleh
:
Covert channels through branch predictors: a feasibility study. HASP@ISCA 2015: 5:1-5:8 - Dirmanto Jap, Marc Stöttinger
, Shivam Bhasin:
Support vector regression: exploiting machine learning techniques for leakage modeling. HASP@ISCA 2015: 2:1-2:8 - Yongje Lee, Ingoo Heo, Dongil Hwang, Kyungmin Kim, Yunheung Paek:
Towards a practical solution to detect code reuse attacks on ARM mobile devices. HASP@ISCA 2015: 3:1-3:8 - Fangfei Liu, Hao Wu, Ruby B. Lee:
Can randomized mapping secure instruction caches from side-channel attacks? HASP@ISCA 2015: 4:1-4:8 - Pei Luo
, Yunsi Fei
, Xin Fang, A. Adam Ding
, David R. Kaeli, Miriam Leeser
:
Side-channel analysis of MAC-Keccak hardware implementations. HASP@ISCA 2015: 1:1-1:8 - Junaid Nomani, Jakub Szefer:
Predicting program phases and defending against side-channel attacks using hardware performance counters. HASP@ISCA 2015: 9:1-9:4 - Salaheddine Ouaarab, Guillaume Duc, Renaud Pacalet:
Performance optimizations of integrity checking based on Merkle trees. HASP@ISCA 2015: 10:1-10:4 - Ruby B. Lee, Weidong Shi, Jakub Szefer:
Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015. ACM 2015, ISBN 978-1-4503-3483-9 [contents] - 2014
- Jie Chen, Guru Venkataramani:
An algorithm for detecting contention-based covert timing channels on shared hardware. HASP@ISCA 2014: 1:1-1:8 - Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
Side-channel leakage and trace compression using normalized inter-class variance. HASP@ISCA 2014: 7:1-7:9 - Taoufik Chouta, Tarik Graba, Jean-Luc Danger, Julien Bringer, Maël Berthier, Yves Bocktaels, Mélanie Favre, Hervé Chabanne
:
Side channel analysis on an embedded hardware fingerprint biometric comparator & low cost countermeasures. HASP@ISCA 2014: 6:1-6:6 - Udit Dhawan, Nikos Vasilakis, Raphael Rubin, Silviu Chiricescu, Jonathan M. Smith, Thomas F. Knight Jr., Benjamin C. Pierce, André DeHon:
PUMP: a programmable unit for metadata processing. HASP@ISCA 2014: 8:1-8:8 - Claudio Ferretti
, Silvia Mella
, Filippo Melzani
:
The role of the fault model in DFA against AES. HASP@ISCA 2014: 4:1-4:8 - Akhila Gundu, Gita Sreekumar, Ali Shafiee, Seth H. Pugsley, Hardik B. Jain, Rajeev Balasubramonian, Mohit Tiwari
:
Memory bandwidth reservation in the cloud to avoid information leakage in the memory controller. HASP@ISCA 2014: 11:1-11:5 - Mikhail Kazdagli, Ling Huang, Vijay Janapa Reddi, Mohit Tiwari
:
Morpheus: benchmarking computational diversity in mobile malware. HASP@ISCA 2014: 3:1-3:8 - Tushar Swamy, Neel Shah, Pei Luo
, Yunsi Fei
, David R. Kaeli:
Scalable and efficient implementation of correlation power analysis using graphics processing units (GPUs). HASP@ISCA 2014: 10:1-10:8 - Jakub Szefer, Sebastian Biedermann:
Towards fast hardware memory integrity checking with skewed Merkle trees. HASP@ISCA 2014: 9:1-9:8 - Lei Xu
, Weidong Shi, Nicholas DeSalvo:
Seasoning effect based side channel attacks to AES implementation with phase change memory. HASP@ISCA 2014: 5:1-5:8 - Mengchao Yue, William H. Robinson
, Lanier A. Watkins, Cherita L. Corbett:
Constructing timing-based covert channels in mobile networks by adjusting CPU frequency. HASP@ISCA 2014: 2:1-2:8 - Ruby B. Lee, Weidong Shi:
HASP 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014. ACM 2014, ISBN 978-1-4503-2777-0 [contents] - 2013
- Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay:
Unraveling timewarp: what all the fuzz is about? HASP@ISCA 2013: 8 - Claude Carlet, Sylvain Guilley:
Side-channel indistinguishability. HASP@ISCA 2013: 9 - Zouha Cherif, Jean-Luc Danger, Florent Lozach, Yves Mathieu, Lilian Bossuet:
Evaluation of delay PUFs on CMOS 65 nm technology: ASIC vs FPGA. HASP@ISCA 2013: 4 - Shizun Ge, Zhen Wang, Pei Luo, Mark G. Karpovsky:
Secure memories resistant to both random errors and fault injection attacks using nonlinear error correction codes. HASP@ISCA 2013: 5 - Matthew Hoekstra, Reshma Lal, Pradeep Pappachan, Vinay Phegade, Juan del Cuvillo:
Using innovative instructions to create trustworthy software solutions. HASP@ISCA 2013: 11 - Fangfei Liu, Ruby B. Lee:
Security testing of a secure cache design. HASP@ISCA 2013: 3 - Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V. Rozas, Hisham Shafi, Vedvyas Shanbhogue, Uday R. Savagaonkar:
Innovative instructions and software model for isolated execution. HASP@ISCA 2013: 10 - Michael Muehlberghuber, Frank K. Gürkaynak, Thomas Korak, Philipp Dunst, Michael Hutter:
Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC. HASP@ISCA 2013: 1 - Yossef Oren
, Ofir Weisse, Avishai Wool
:
Practical template-algebraic side channel attacks with extremely low data complexity. HASP@ISCA 2013: 7 - Juan Carlos Martínez Santos
, Yunsi Fei:
Micro-architectural support for metadata coherence in multi-core dynamic information flow tracking. HASP@ISCA 2013: 6