The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "HASP@ISCA"( http://dblp.L3S.de/Venues/HASP@ISCA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/isca

Publication years (Num. hits)
2013-2014 (24) 2015-2016 (23) 2017-2018 (20) 2019 (9)
Publication types (Num. hits)
inproceedings(69) proceedings(7)
Venues (Conferences, Journals, ...)
HASP@ISCA(76)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 76 publication records. Showing 76 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1 Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019. Search on Bibsonomy HASP@ISCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Santhosh Kumar T, Debadatta Mishra, Biswabandan Panda, Nayan Deshmukh CoWLight: Hardware Assisted Copy-on-Write Fault Handling for Secure Deduplication. Search on Bibsonomy HASP@ISCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Vedvyas Shanbhogue, Deepak Gupta, Ravi Sahita Security Analysis of Processor Instruction Set Architecture for Enforcing Control-Flow Integrity. Search on Bibsonomy HASP@ISCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Somnath Chakrabarti, Matthew Hoekstra, Dmitrii Kuvaiskii, Mona Vij Scaling Intel® Software Guard Extensions Applications with Intel® SGX Card. Search on Bibsonomy HASP@ISCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Gildo Torres, Zhiliu Yang, Zander Blasingame, James Bruska, Chen Liu 0001 Detecting Non-Control-Flow Hijacking Attacks Using Contextual Execution Information. Search on Bibsonomy HASP@ISCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Atsuko Shimizu, Daniel Townley, Mohit Joshi, Dmitry Ponomarev 0001 EA-PLRU: Enclave-Aware Cache Replacement. Search on Bibsonomy HASP@ISCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shuwen Deng, Doguhan Gümüsoglu, Wenjie Xiong 0001, Sercan Sari, Y. Serhan Gener, Corine Lu, Onur Demir, Jakub Szefer SecChisel Framework for Security Verification of Secure Processor Architectures. Search on Bibsonomy HASP@ISCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Craig Disselkoen, John Renner, Conrad Watt, Tal Garfinkel, Amit Levy, Deian Stefan Position Paper: Progressive Memory Safety for WebAssembly. Search on Bibsonomy HASP@ISCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Xin Wang 0056, Wei Zhang 0002 Cracking Randomized Coalescing Techniques with An Efficient Profiling-Based Side-Channel Attack to GPU. Search on Bibsonomy HASP@ISCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jakub Szefer, Weidong Shi, Ruby B. Lee (eds.) Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018 Search on Bibsonomy HASP@ISCA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Saru Vig, Siew-Kei Lam, Sarani Bhattacharya, Debdeep Mukhopadhyay Rapid detection of rowhammer attacks using dynamic skewed hash tree. Search on Bibsonomy HASP@ISCA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Travis Peters, Reshma Lal, Srikanth Varadarajan, Pradeep Pappachan, David Kotz BASTION-SGX: bluetooth and architectural support for trusted I/O on SGX. Search on Bibsonomy HASP@ISCA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiaowan Dong, Zhuojia Shen, John Criswell, Alan L. Cox, Sandhya Dwarkadas Spectres, virtual ghosts, and hardware support. Search on Bibsonomy HASP@ISCA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Saeid Mofrad, Fengwei Zhang, Shiyong Lu, Weidong Shi A comparison study of intel SGX and AMD memory encryption technology. Search on Bibsonomy HASP@ISCA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohammad Nasim Imtiaz Khan, Swaroop Ghosh Fault injection attacks on emerging non-volatile memory and countermeasures. Search on Bibsonomy HASP@ISCA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Maria Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, Maham Chaudhry, Vianney Lapotre, Guy Gogniat NIGHTs-WATCH: a cache-based side-channel intrusion detector using hardware performance counters. Search on Bibsonomy HASP@ISCA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jason Lowe-Power, Venkatesh Akella, Matthew K. Farrens, Samuel T. King, Christopher J. Nitta A case for exposing extra-architectural state in the ISA: position paper. Search on Bibsonomy HASP@ISCA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ming Ming Wong, Jawad Haj-Yahya, Anupam Chattopadhyay SMARTS: secure memory assurance of RISC-V trusted SoC. Search on Bibsonomy HASP@ISCA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andrew Vuong, Ali Shafiee, Meysam Taassori, Rajeev Balasubramonian An MLP-aware leakage-free memory controller. Search on Bibsonomy HASP@ISCA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shuwen Deng, Wenjie Xiong 0001, Jakub Szefer Cache timing side-channel vulnerability checking with computation tree logic. Search on Bibsonomy HASP@ISCA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Santosh Ghosh, Rafael Misoczki, Li Zhao 0002, Manoj R. Sastry Lightweight Block Cipher Circuits for Automotive and IoT Sensor Devices. Search on Bibsonomy HASP@ISCA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tianwei Zhang 0004, Ruby B. Lee Host-Based Dos Attacks and Defense in the Cloud. Search on Bibsonomy HASP@ISCA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017 Search on Bibsonomy HASP@ISCA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Orlando Arias, Dean Sullivan, Yier Jin HA2lloc: Hardware-Assisted Secure Allocator. Search on Bibsonomy HASP@ISCA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ofir Shwartz, Yitzhak Birk SeM: A CPU Architecture Extension for Secure Remote Computing. Search on Bibsonomy HASP@ISCA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhenyu Ning, Fengwei Zhang, Weisong Shi, Weidong Shi Position Paper: Challenges Towards Securing Hardware-assisted Execution Environments. Search on Bibsonomy HASP@ISCA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Weize Yu, Selçuk Köse A Lightweight AES Implementation Against Bivariate First-Order DPA Attacks. Search on Bibsonomy HASP@ISCA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Arjun Menon, Subadra Murugan, Chester Rebeiro, Neel Gala, Kamakoti Veezhinathan Shakti-T: A RISC-V Processor with Light Weight Security Extensions. Search on Bibsonomy HASP@ISCA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Somnath Chakrabarti, Rebekah Leslie-Hurd, Mona Vij, Frank McKeen, Carlos V. Rozas, Dror Caspi, Ilya Alexandrovich, Ittai Anati Intel® Software Guard Extensions (Intel® SGX) Architecture for Oversubscription of Secure Memory in a Virtualized Environment. Search on Bibsonomy HASP@ISCA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Leonid Azriel, Ran Ginosar, Shay Gueron, Avi Mendelson Using Scan Side Channel for Detecting IP Theft. Search on Bibsonomy HASP@ISCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hyungon Moon, Jinyong Lee, Dongil Hwang, Seonhwa Jung, Jiwon Seo, Yunheung Paek Architectural Supports to Protect OS Kernels from Code-Injection Attacks. Search on Bibsonomy HASP@ISCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bilgiday Yuce, Nahid Farhady Ghalaty, Chinmay Deshpande, Conor Patrick, Leyla Nazhandali, Patrick Schaumont FAME: Fault-attack Aware Microprocessor Extensions for Hardware Fault Detection and Software Fault Response. Search on Bibsonomy HASP@ISCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fengwei Zhang, Hongwei Zhang 0001 SoK: A Study of Using Hardware-assisted Isolated Execution Environments for Security. Search on Bibsonomy HASP@ISCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Darshana Jayasinghe Template Attacks with Partial Profiles and Dirichlet Priors: Application to Timing Attacks. Search on Bibsonomy HASP@ISCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gildo Torres, Chen Liu 0001 Can Data-Only Exploits be Detected at Runtime Using Hardware Events?: A Case Study of the Heartbleed Vulnerability. Search on Bibsonomy HASP@ISCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wei-Han Lee, Ruby B. Lee Implicit Sensor-based Authentication of Smartphone Users with Smartwatch. Search on Bibsonomy HASP@ISCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1 Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016 Search on Bibsonomy HASP@ISCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Frank McKeen, Ilya Alexandrovich, Ittai Anati, Dror Caspi, Simon Johnson, Rebekah Leslie-Hurd, Carlos V. Rozas Intel® Software Guard Extensions (Intel® SGX) Support for Dynamic Memory Management Inside an Enclave. Search on Bibsonomy HASP@ISCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay A Formal Security Analysis of Even-Odd Sequential Prefetching in Profiled Cache-Timing Attacks. Search on Bibsonomy HASP@ISCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hemendra K. Rawat, Patrick Schaumont SIMD Instruction Set Extensions for Keccak with Applications to SHA-3, Keyak and Ketje. Search on Bibsonomy HASP@ISCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bin Cedric Xing, Mark Shanahan, Rebekah Leslie-Hurd Intel® Software Guard Extensions (Intel® SGX) Software Support for Dynamic Memory Allocation inside an Enclave. Search on Bibsonomy HASP@ISCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Salaheddine Ouaarab, Guillaume Duc, Renaud Pacalet Performance optimizations of integrity checking based on Merkle trees. Search on Bibsonomy HASP@ISCA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alexander DeTrano, Sylvain Guilley, Xiaofei Guo, Naghmeh Karimi, Ramesh Karri Exploiting small leakages in masks to turn a second-order attack into a first-order attack. Search on Bibsonomy HASP@ISCA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Junaid Nomani, Jakub Szefer Predicting program phases and defending against side-channel attacks using hardware performance counters. Search on Bibsonomy HASP@ISCA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Masab Ahmad, Syed Kamran Haider, Farrukh Hijaz, Marten van Dijk, Omer Khan Exploring the performance implications of memory safety primitives in many-core processors executing multi-threaded workloads. Search on Bibsonomy HASP@ISCA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pei Luo, Yunsi Fei, Xin Fang 0001, A. Adam Ding, David R. Kaeli, Miriam Leeser Side-channel analysis of MAC-Keccak hardware implementations. Search on Bibsonomy HASP@ISCA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yongje Lee, Ingoo Heo, Dongil Hwang, Kyungmin Kim, Yunheung Paek Towards a practical solution to detect code reuse attacks on ARM mobile devices. Search on Bibsonomy HASP@ISCA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dirmanto Jap, Marc Stöttinger, Shivam Bhasin Support vector regression: exploiting machine learning techniques for leakage modeling. Search on Bibsonomy HASP@ISCA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dmitry Evtyushkin, Dmitry V. Ponomarev, Nael B. Abu-Ghazaleh Covert channels through branch predictors: a feasibility study. Search on Bibsonomy HASP@ISCA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ruby B. Lee, Weidong Shi, Jakub Szefer (eds.) Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015 Search on Bibsonomy HASP@ISCA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fangfei Liu, Hao Wu, Ruby B. Lee Can randomized mapping secure instruction caches from side-channel attacks? Search on Bibsonomy HASP@ISCA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohamed El-Hadedy 0001, Kevin Skadron Hardware overhead analysis of programmability in ARX crypto processing. Search on Bibsonomy HASP@ISCA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tushar Swamy, Neel Shah, Pei Luo, Yunsi Fei, David R. Kaeli Scalable and efficient implementation of correlation power analysis using graphics processing units (GPUs). Search on Bibsonomy HASP@ISCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm Side-channel leakage and trace compression using normalized inter-class variance. Search on Bibsonomy HASP@ISCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lei Xu 0012, Weidong Shi, Nicholas DeSalvo Seasoning effect based side channel attacks to AES implementation with phase change memory. Search on Bibsonomy HASP@ISCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Udit Dhawan, Nikos Vasilakis, Raphael Rubin, Silviu Chiricescu, Jonathan M. Smith, Thomas F. Knight Jr., Benjamin C. Pierce, André DeHon PUMP: a programmable unit for metadata processing. Search on Bibsonomy HASP@ISCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jakub Szefer, Sebastian Biedermann Towards fast hardware memory integrity checking with skewed Merkle trees. Search on Bibsonomy HASP@ISCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Akhila Gundu, Gita Sreekumar, Ali Shafiee, Seth H. Pugsley, Hardik B. Jain, Rajeev Balasubramonian, Mohit Tiwari Memory bandwidth reservation in the cloud to avoid information leakage in the memory controller. Search on Bibsonomy HASP@ISCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jie Chen 0020, Guru Venkataramani An algorithm for detecting contention-based covert timing channels on shared hardware. Search on Bibsonomy HASP@ISCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mikhail Kazdagli, Ling Huang, Vijay Janapa Reddi, Mohit Tiwari Morpheus: benchmarking computational diversity in mobile malware. Search on Bibsonomy HASP@ISCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mengchao Yue, William H. Robinson, Lanier A. Watkins, Cherita L. Corbett Constructing timing-based covert channels in mobile networks by adjusting CPU frequency. Search on Bibsonomy HASP@ISCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Claudio Ferretti, Silvia Mella, Filippo Melzani The role of the fault model in DFA against AES. Search on Bibsonomy HASP@ISCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Taoufik Chouta, Tarik Graba, Jean-Luc Danger, Julien Bringer, Maël Berthier, Yves Bocktaels, Mélanie Favre, Hervé Chabanne Side channel analysis on an embedded hardware fingerprint biometric comparator & low cost countermeasures. Search on Bibsonomy HASP@ISCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ruby B. Lee, Weidong Shi (eds.) HASP 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014 Search on Bibsonomy HASP@ISCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Claude Carlet, Sylvain Guilley Side-channel indistinguishability. Search on Bibsonomy HASP@ISCA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yossef Oren, Ofir Weisse, Avishai Wool Practical template-algebraic side channel attacks with extremely low data complexity. Search on Bibsonomy HASP@ISCA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Muehlberghuber, Frank K. Gürkaynak, Thomas Korak, Philipp Dunst, Michael Hutter Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC. Search on Bibsonomy HASP@ISCA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fangfei Liu, Ruby B. Lee Security testing of a secure cache design. Search on Bibsonomy HASP@ISCA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay Unraveling timewarp: what all the fuzz is about? Search on Bibsonomy HASP@ISCA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zouha Cherif, Jean-Luc Danger, Florent Lozach, Yves Mathieu, Lilian Bossuet Evaluation of delay PUFs on CMOS 65 nm technology: ASIC vs FPGA. Search on Bibsonomy HASP@ISCA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V. Rozas, Hisham Shafi, Vedvyas Shanbhogue, Uday R. Savagaonkar Innovative instructions and software model for isolated execution. Search on Bibsonomy HASP@ISCA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Juan Carlos Martínez Santos, Yunsi Fei Micro-architectural support for metadata coherence in multi-core dynamic information flow tracking. Search on Bibsonomy HASP@ISCA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ruby B. Lee, Weidong Shi (eds.) HASP 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013 Search on Bibsonomy HASP@ISCA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shizun Ge, Zhen Wang 0001, Pei Luo, Mark G. Karpovsky Secure memories resistant to both random errors and fault injection attacks using nonlinear error correction codes. Search on Bibsonomy HASP@ISCA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tianwei Zhang 0004, Fangfei Liu, Si Chen, Ruby B. Lee Side channel vulnerability metrics: the promise and the pitfalls. Search on Bibsonomy HASP@ISCA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Matthew Hoekstra, Reshma Lal, Pradeep Pappachan, Vinay Phegade, Juan del Cuvillo Using innovative instructions to create trustworthy software solutions. Search on Bibsonomy HASP@ISCA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #76 of 76 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license