|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 76 publication records. Showing 76 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | |
Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019. |
HASP@ISCA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Santhosh Kumar T, Debadatta Mishra, Biswabandan Panda, Nayan Deshmukh |
CoWLight: Hardware Assisted Copy-on-Write Fault Handling for Secure Deduplication. |
HASP@ISCA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Vedvyas Shanbhogue, Deepak Gupta, Ravi Sahita |
Security Analysis of Processor Instruction Set Architecture for Enforcing Control-Flow Integrity. |
HASP@ISCA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Somnath Chakrabarti, Matthew Hoekstra, Dmitrii Kuvaiskii, Mona Vij |
Scaling Intel® Software Guard Extensions Applications with Intel® SGX Card. |
HASP@ISCA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Gildo Torres, Zhiliu Yang, Zander Blasingame, James Bruska, Chen Liu 0001 |
Detecting Non-Control-Flow Hijacking Attacks Using Contextual Execution Information. |
HASP@ISCA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Atsuko Shimizu, Daniel Townley, Mohit Joshi, Dmitry Ponomarev 0001 |
EA-PLRU: Enclave-Aware Cache Replacement. |
HASP@ISCA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Shuwen Deng, Doguhan Gümüsoglu, Wenjie Xiong 0001, Sercan Sari, Y. Serhan Gener, Corine Lu, Onur Demir, Jakub Szefer |
SecChisel Framework for Security Verification of Secure Processor Architectures. |
HASP@ISCA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Craig Disselkoen, John Renner, Conrad Watt, Tal Garfinkel, Amit Levy, Deian Stefan |
Position Paper: Progressive Memory Safety for WebAssembly. |
HASP@ISCA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Xin Wang 0056, Wei Zhang 0002 |
Cracking Randomized Coalescing Techniques with An Efficient Profiling-Based Side-Channel Attack to GPU. |
HASP@ISCA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jakub Szefer, Weidong Shi, Ruby B. Lee (eds.) |
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018 |
HASP@ISCA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Saru Vig, Siew-Kei Lam, Sarani Bhattacharya, Debdeep Mukhopadhyay |
Rapid detection of rowhammer attacks using dynamic skewed hash tree. |
HASP@ISCA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Travis Peters, Reshma Lal, Srikanth Varadarajan, Pradeep Pappachan, David Kotz |
BASTION-SGX: bluetooth and architectural support for trusted I/O on SGX. |
HASP@ISCA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xiaowan Dong, Zhuojia Shen, John Criswell, Alan L. Cox, Sandhya Dwarkadas |
Spectres, virtual ghosts, and hardware support. |
HASP@ISCA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Saeid Mofrad, Fengwei Zhang, Shiyong Lu, Weidong Shi |
A comparison study of intel SGX and AMD memory encryption technology. |
HASP@ISCA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Nasim Imtiaz Khan, Swaroop Ghosh |
Fault injection attacks on emerging non-volatile memory and countermeasures. |
HASP@ISCA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Maria Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, Maham Chaudhry, Vianney Lapotre, Guy Gogniat |
NIGHTs-WATCH: a cache-based side-channel intrusion detector using hardware performance counters. |
HASP@ISCA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jason Lowe-Power, Venkatesh Akella, Matthew K. Farrens, Samuel T. King, Christopher J. Nitta |
A case for exposing extra-architectural state in the ISA: position paper. |
HASP@ISCA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ming Ming Wong, Jawad Haj-Yahya, Anupam Chattopadhyay |
SMARTS: secure memory assurance of RISC-V trusted SoC. |
HASP@ISCA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Vuong, Ali Shafiee, Meysam Taassori, Rajeev Balasubramonian |
An MLP-aware leakage-free memory controller. |
HASP@ISCA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Shuwen Deng, Wenjie Xiong 0001, Jakub Szefer |
Cache timing side-channel vulnerability checking with computation tree logic. |
HASP@ISCA |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Santosh Ghosh, Rafael Misoczki, Li Zhao 0002, Manoj R. Sastry |
Lightweight Block Cipher Circuits for Automotive and IoT Sensor Devices. |
HASP@ISCA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Tianwei Zhang 0004, Ruby B. Lee |
Host-Based Dos Attacks and Defense in the Cloud. |
HASP@ISCA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017 |
HASP@ISCA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Orlando Arias, Dean Sullivan, Yier Jin |
HA2lloc: Hardware-Assisted Secure Allocator. |
HASP@ISCA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ofir Shwartz, Yitzhak Birk |
SeM: A CPU Architecture Extension for Secure Remote Computing. |
HASP@ISCA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zhenyu Ning, Fengwei Zhang, Weisong Shi, Weidong Shi |
Position Paper: Challenges Towards Securing Hardware-assisted Execution Environments. |
HASP@ISCA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Weize Yu, Selçuk Köse |
A Lightweight AES Implementation Against Bivariate First-Order DPA Attacks. |
HASP@ISCA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Arjun Menon, Subadra Murugan, Chester Rebeiro, Neel Gala, Kamakoti Veezhinathan |
Shakti-T: A RISC-V Processor with Light Weight Security Extensions. |
HASP@ISCA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Somnath Chakrabarti, Rebekah Leslie-Hurd, Mona Vij, Frank McKeen, Carlos V. Rozas, Dror Caspi, Ilya Alexandrovich, Ittai Anati |
Intel® Software Guard Extensions (Intel® SGX) Architecture for Oversubscription of Secure Memory in a Virtualized Environment. |
HASP@ISCA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Leonid Azriel, Ran Ginosar, Shay Gueron, Avi Mendelson |
Using Scan Side Channel for Detecting IP Theft. |
HASP@ISCA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hyungon Moon, Jinyong Lee, Dongil Hwang, Seonhwa Jung, Jiwon Seo, Yunheung Paek |
Architectural Supports to Protect OS Kernels from Code-Injection Attacks. |
HASP@ISCA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Bilgiday Yuce, Nahid Farhady Ghalaty, Chinmay Deshpande, Conor Patrick, Leyla Nazhandali, Patrick Schaumont |
FAME: Fault-attack Aware Microprocessor Extensions for Hardware Fault Detection and Software Fault Response. |
HASP@ISCA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fengwei Zhang, Hongwei Zhang 0001 |
SoK: A Study of Using Hardware-assisted Isolated Execution Environments for Security. |
HASP@ISCA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Darshana Jayasinghe |
Template Attacks with Partial Profiles and Dirichlet Priors: Application to Timing Attacks. |
HASP@ISCA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Gildo Torres, Chen Liu 0001 |
Can Data-Only Exploits be Detected at Runtime Using Hardware Events?: A Case Study of the Heartbleed Vulnerability. |
HASP@ISCA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Wei-Han Lee, Ruby B. Lee |
Implicit Sensor-based Authentication of Smartphone Users with Smartwatch. |
HASP@ISCA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016 |
HASP@ISCA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Frank McKeen, Ilya Alexandrovich, Ittai Anati, Dror Caspi, Simon Johnson, Rebekah Leslie-Hurd, Carlos V. Rozas |
Intel® Software Guard Extensions (Intel® SGX) Support for Dynamic Memory Management Inside an Enclave. |
HASP@ISCA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay |
A Formal Security Analysis of Even-Odd Sequential Prefetching in Profiled Cache-Timing Attacks. |
HASP@ISCA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hemendra K. Rawat, Patrick Schaumont |
SIMD Instruction Set Extensions for Keccak with Applications to SHA-3, Keyak and Ketje. |
HASP@ISCA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Bin Cedric Xing, Mark Shanahan, Rebekah Leslie-Hurd |
Intel® Software Guard Extensions (Intel® SGX) Software Support for Dynamic Memory Allocation inside an Enclave. |
HASP@ISCA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Salaheddine Ouaarab, Guillaume Duc, Renaud Pacalet |
Performance optimizations of integrity checking based on Merkle trees. |
HASP@ISCA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alexander DeTrano, Sylvain Guilley, Xiaofei Guo, Naghmeh Karimi, Ramesh Karri |
Exploiting small leakages in masks to turn a second-order attack into a first-order attack. |
HASP@ISCA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Junaid Nomani, Jakub Szefer |
Predicting program phases and defending against side-channel attacks using hardware performance counters. |
HASP@ISCA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Masab Ahmad, Syed Kamran Haider, Farrukh Hijaz, Marten van Dijk, Omer Khan |
Exploring the performance implications of memory safety primitives in many-core processors executing multi-threaded workloads. |
HASP@ISCA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Pei Luo, Yunsi Fei, Xin Fang 0001, A. Adam Ding, David R. Kaeli, Miriam Leeser |
Side-channel analysis of MAC-Keccak hardware implementations. |
HASP@ISCA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yongje Lee, Ingoo Heo, Dongil Hwang, Kyungmin Kim, Yunheung Paek |
Towards a practical solution to detect code reuse attacks on ARM mobile devices. |
HASP@ISCA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dirmanto Jap, Marc Stöttinger, Shivam Bhasin |
Support vector regression: exploiting machine learning techniques for leakage modeling. |
HASP@ISCA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry Evtyushkin, Dmitry V. Ponomarev, Nael B. Abu-Ghazaleh |
Covert channels through branch predictors: a feasibility study. |
HASP@ISCA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ruby B. Lee, Weidong Shi, Jakub Szefer (eds.) |
Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015 |
HASP@ISCA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fangfei Liu, Hao Wu, Ruby B. Lee |
Can randomized mapping secure instruction caches from side-channel attacks? |
HASP@ISCA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed El-Hadedy 0001, Kevin Skadron |
Hardware overhead analysis of programmability in ARX crypto processing. |
HASP@ISCA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tushar Swamy, Neel Shah, Pei Luo, Yunsi Fei, David R. Kaeli |
Scalable and efficient implementation of correlation power analysis using graphics processing units (GPUs). |
HASP@ISCA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm |
Side-channel leakage and trace compression using normalized inter-class variance. |
HASP@ISCA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lei Xu 0012, Weidong Shi, Nicholas DeSalvo |
Seasoning effect based side channel attacks to AES implementation with phase change memory. |
HASP@ISCA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Udit Dhawan, Nikos Vasilakis, Raphael Rubin, Silviu Chiricescu, Jonathan M. Smith, Thomas F. Knight Jr., Benjamin C. Pierce, André DeHon |
PUMP: a programmable unit for metadata processing. |
HASP@ISCA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jakub Szefer, Sebastian Biedermann |
Towards fast hardware memory integrity checking with skewed Merkle trees. |
HASP@ISCA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Akhila Gundu, Gita Sreekumar, Ali Shafiee, Seth H. Pugsley, Hardik B. Jain, Rajeev Balasubramonian, Mohit Tiwari |
Memory bandwidth reservation in the cloud to avoid information leakage in the memory controller. |
HASP@ISCA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jie Chen 0020, Guru Venkataramani |
An algorithm for detecting contention-based covert timing channels on shared hardware. |
HASP@ISCA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mikhail Kazdagli, Ling Huang, Vijay Janapa Reddi, Mohit Tiwari |
Morpheus: benchmarking computational diversity in mobile malware. |
HASP@ISCA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mengchao Yue, William H. Robinson, Lanier A. Watkins, Cherita L. Corbett |
Constructing timing-based covert channels in mobile networks by adjusting CPU frequency. |
HASP@ISCA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Claudio Ferretti, Silvia Mella, Filippo Melzani |
The role of the fault model in DFA against AES. |
HASP@ISCA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Taoufik Chouta, Tarik Graba, Jean-Luc Danger, Julien Bringer, Maël Berthier, Yves Bocktaels, Mélanie Favre, Hervé Chabanne |
Side channel analysis on an embedded hardware fingerprint biometric comparator & low cost countermeasures. |
HASP@ISCA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ruby B. Lee, Weidong Shi (eds.) |
HASP 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014 |
HASP@ISCA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Claude Carlet, Sylvain Guilley |
Side-channel indistinguishability. |
HASP@ISCA |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yossef Oren, Ofir Weisse, Avishai Wool |
Practical template-algebraic side channel attacks with extremely low data complexity. |
HASP@ISCA |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael Muehlberghuber, Frank K. Gürkaynak, Thomas Korak, Philipp Dunst, Michael Hutter |
Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC. |
HASP@ISCA |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Fangfei Liu, Ruby B. Lee |
Security testing of a secure cache design. |
HASP@ISCA |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay |
Unraveling timewarp: what all the fuzz is about? |
HASP@ISCA |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zouha Cherif, Jean-Luc Danger, Florent Lozach, Yves Mathieu, Lilian Bossuet |
Evaluation of delay PUFs on CMOS 65 nm technology: ASIC vs FPGA. |
HASP@ISCA |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V. Rozas, Hisham Shafi, Vedvyas Shanbhogue, Uday R. Savagaonkar |
Innovative instructions and software model for isolated execution. |
HASP@ISCA |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Juan Carlos Martínez Santos, Yunsi Fei |
Micro-architectural support for metadata coherence in multi-core dynamic information flow tracking. |
HASP@ISCA |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ruby B. Lee, Weidong Shi (eds.) |
HASP 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013 |
HASP@ISCA |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shizun Ge, Zhen Wang 0001, Pei Luo, Mark G. Karpovsky |
Secure memories resistant to both random errors and fault injection attacks using nonlinear error correction codes. |
HASP@ISCA |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tianwei Zhang 0004, Fangfei Liu, Si Chen, Ruby B. Lee |
Side channel vulnerability metrics: the promise and the pitfalls. |
HASP@ISCA |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Hoekstra, Reshma Lal, Pradeep Pappachan, Vinay Phegade, Juan del Cuvillo |
Using innovative instructions to create trustworthy software solutions. |
HASP@ISCA |
2013 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #76 of 76 (100 per page; Change: )
|
|