default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 58 matches
- 2024
- Donayam Benti, Todd M. Austin:
Channelizer: Explainable ML Inference for Validating Side-Channel Resistant Systems. SEED 2024: 23-34 - Mukta Debnath, Krishnendu Guha, Debasri Saha, Susmita Sur-Kolay:
Aggregate Encryption Individual Decryption for FPGA Bitstream Protection on Cloud. SEED 2024: 155-166 - Preet Derasari, Guru Venkataramani:
Maya: Hardware Enhanced Customizable Defenses at the User-Kernel Interface. SEED 2024: 50-61 - Per Ekemark, Alberto Ros, Konstantinos Sagonas, Stefanos Kaxiras:
A First Exploration of Fine-Grain Coherence for Integrity Metadata. SEED 2024: 62-72 - Anthony Etim, Shanquan Tian, Jakub Szefer:
Extending FPGA Information Leaks with Trojan Phantom Circuits. SEED 2024: 1-10 - Derrick Greenspan, Naveed Ul Mustafa, Andres Delgado, Connor Bramham, Christopher Prats, Samu Wallace, Mark Heinrich, Yan Solihin:
LOaPP: Improving the Performance of Persistent Memory Objects via Low-Overhead at-Rest PMO Protection. SEED 2024: 131-142 - Haoyang Huang, Fengwei Zhang, Shoumeng Yan, Tao Wei, Zhengyu He:
SoK: A Comparison Study of Arm TrustZone and CCA. SEED 2024: 107-118 - Yonas Kelemework, Alaa R. Alameldeen:
INTERFACE: An Indirect, Partitioned, Random, Fully-Associative Cache to Avoid Shared Last-Level Cache Attacks. SEED 2024: 37-49 - Sangpyo Kim, Jongmin Kim, Jaeyoung Choi, Jung Ho Ahn:
CiFHER: A Chiplet-Based FHE Accelerator with a Resizable Structure. SEED 2024: 119-130 - Tong Liu, Zhen Huang, Jiaao Li, Jianyu Niu, Guoxing Chen, Yinqian Zhang:
SoK: Opportunities for Accelerating Multi - Party Computation via Trusted Hardware. SEED 2024: 143-154 - Jared Nye, Usman Ali, Omer Khan:
SSE: Security Service Engines to Scale Enclave Parallelism for System Interactive Applications. SEED 2024: 84-95 - Jerry Tan, Chuanqi Xu, Theodoros Trochatos, Jakub Szefer:
Extending and Defending Attacks on Reset Operations in Quantum Computers. SEED 2024: 73-83 - Shijia Wei, Austin Harris, Yongye Zhu, Prakash Ramrakhyani, Calvin Lin, Mohit Tiwari:
Tail Victims in Termination Timing Channel Defenses Beyond Cryptographic Kernels. SEED 2024: 11-22 - Yicheng Zhang, Ravan Nazaraliyev, Sankha Baran Dutta, Nael B. Abu-Ghazaleh, Andres Marquez, Kevin J. Barker:
Beyond the Bridge: Contention-Based Covert and Side Channel Attacks on Multi-GPU Interconnect. SEED 2024: 35-36 - Ziming Zhao, Md. Armanuzzaman, Xi Tan, Zheyuan Ma:
Trusted Execution Environments in Embedded and IoT Systems: A CactiLab Perspective. SEED 2024: 96-106 - International Symposium on Secure and Private Execution Environment Design, SEED 2024, Orlando, FL, USA, May 16-17, 2024. IEEE 2024, ISBN 979-8-3315-0565-3 [contents]
- 2022
- Jacob Abraham, Alan Ehret, Michel A. Kinsy:
A Compiler for Transparent Namespace-Based Access Control for the Zeno Architecture. SEED 2022: 1-10 - Pavlos Aimoniotis, Amund Bergland Kvalsvik, Magnus Själander, Stefanos Kaxiras:
Data-Out Instruction-In (DOIN!): Leveraging Inclusive Caches to Attack Speculative Delay Schemes. SEED 2022: 49-60 - Ayaz Akram, Venkatesh Akella, Sean Peisert, Jason Lowe-Power:
SoK: Limitations of Confidential Computing via TEEs for High-Performance Compute Systems. SEED 2022: 121-132 - Usman Ali, Abdul Rasheed Sahni, Omer Khan:
Protecting On-Chip Data Access Against Timing-Based Side-Channel Attacks on Multicores. SEED 2022: 190-201 - Lauren Biernacki, Meron Zerihun Demissie, Kidus Birkayehu Workneh, Fitsum Assamnew Andargie, Todd M. Austin:
Sequestered Encryption: A Hardware Technique for Comprehensive Data Privacy. SEED 2022: 73-84 - Alvin Oliver Glova, Yukai Yang, Yiyao Wan, Zhizhou Zhang, George Michelogiannakis, Jonathan Balkind, Timothy Sherwood:
Establishing Cooperative Computation with Hardware Embassies. SEED 2022: 85-96 - Kailash Gogineni, Preet Derasari, Guru Venkataramani:
Foreseer: Efficiently Forecasting Malware Event Series with Long Short-Term Memory. SEED 2022: 97-108 - Derrick Greenspan, Naveed Ul Mustafa, Zoran Kolega, Mark A. Heinrich, Yan Solihin:
Improving the Security and Programmability of Persistent Memory Objects. SEED 2022: 157-168 - Roberto Guanciale, Nicolae Paladi, Arash Vahidi:
SoK: Confidential Quartet - Comparison of Platforms for Virtualization-Based Confidential Computing. SEED 2022: 109-120 - Casey Nelson, Joseph Izraelevitz, R. Iris Bahar, Tamara Silbergleit Lehman:
Eliminating Micro-Architectural Side-Channel Attacks using Near Memory Processing. SEED 2022: 179-189 - Kaustubh Shivdikar, Gilbert Jonatan, Evelio Mora, Neal Livesay, Rashmi Agrawal, Ajay Joshi, José L. Abellán, John Kim, David R. Kaeli:
Accelerating Polynomial Multiplication for Homomorphic Encryption on GPUs. SEED 2022: 61-72 - Thomas Unterluggauer, Austin Harris, Scott Constable, Fangfei Liu, Carlos V. Rozas:
Chameleon Cache: Approximating Fully Associative Caches with Random Replacement to Prevent Contention-Based Cache Attacks. SEED 2022: 13-24 - Tarunesh Verma, Achilleas Anastasopoulos, Todd M. Austin:
These Aren't The Caches You're Looking For: Stochastic Channels on Randomized Caches. SEED 2022: 37-48 - Yashika Verma, Biswabandan Panda:
Avenger: Punishing the Cross-Core Last-Level Cache Attacker and Not the Victim by Isolating the Attacker. SEED 2022: 1-12
skipping 28 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-04 21:05 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint