| 4 | -- | 5 | Lizy Kurian John. Secure Architectures |
| 6 | -- | 7 | Simha Sethumadhavan, Mohit Tiwari. Secure Architectures |
| 8 | -- | 16 | Fan Yao, Hongyu Fang, Milos Doroslovacki, Guru Venkataramani. Leveraging Cache Management Hardware for Practical Defense Against Cache Timing Channel Attacks |
| 17 | -- | 26 | Rafael Misoczki, Sean Gulley, Vinodh Gopal, Martin G. Dixon, Hrvoje Vrsalovic, Wajdi K. Feghali. Toward Postquantum Security for Embedded Cores |
| 27 | -- | 34 | Pradip Bose, Saibal Mukhopadhyay. Energy-Secure System Architectures (ESSA): A Workshop Report |
| 35 | -- | 42 | Cynthia Sturton, Matthew Hicks, Samuel T. King, Jonathan M. Smith. FinalFilter: Asserting Security Properties of a Processor at Runtime |
| 44 | -- | 54 | Roman Kaplan, Leonid Yavits, Ran Ginosar. RASSA: Resistive Prealignment Accelerator for Approximate DNA Long Read Mapping |
| 55 | -- | 64 | Amirhossein Mirhosseini, Thomas F. Wenisch. The Queuing-First Approach for Tail Management of Interactive Services |
| 66 | -- | 68 | Shane Greenstein. The Aftermath of the Dyn DDOS Attack |