Abstract is missing.
- Machine Learning on Encrypted Data: Hardware to the RescueFarinaz Koushanfar. 1 [doi]
- Speculative Execution Attacks and Hardware DefensesRuby B. Lee. 3 [doi]
- Isadora: Automated Information Flow Property Generation for Hardware DesignsCalvin Deutschbein, Andres Meza, Francesco Restuccia, Ryan Kastner, Cynthia Sturton. 5-15 [doi]
- Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State ImagingThilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik. 17-27 [doi]
- Practical Aspects on Non-profiled Deep-learning Side-channel Attacks against AES Software Implementation with Two Types of Masking Countermeasures including RSMKunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino. 29-40 [doi]
- A Forward Error Compensation Approach for Fault Resilient Deep Neural Network Accelerator DesignWenye Liu, Chip-Hong Chang. 41-50 [doi]
- Breaking Masked and Shuffled CCA Secure Saber KEM by Power AnalysisKalle Ngo, Elena Dubrova, Thomas Johansson 0001. 51-61 [doi]
- Backdoor Attack on Deep Neural Networks Triggered by Fault Injection Attack on Image Sensor InterfaceTatsuya Oyama, Shunsuke Okura, Kota Yoshida, Takeshi Fujino. 63-72 [doi]
- Spatial Dependency Analysis to Extract Information from Side-Channel MixturesAurélien Vasselle, Hugues Thiebeauld, Philippe Maurine. 73-84 [doi]
- Design Space Exploration of SABER in 65nm ASICMalik Imran, Felipe Almeida, Jaan Raik, Andrea Basso 0002, Sujoy Sinha Roy, Samuel Pagliarini. 85-90 [doi]
- Spoofing Attacks Against Vehicular FMCW RadarRony Komissarov, Avishai Wool. 91-97 [doi]
- WaC: Trustworthy Encryption and Communication in an IT Ecosystem with Artificial SuperintelligenceErland Wittkotter. 99-109 [doi]
- WaC: First Results on Practical Side-Channel Attacks on Commercial Machine Learning AcceleratorYoo-Seung Won, Soham Chatterjee, Dirmanto Jap, Arindam Basu, Shivam Bhasin. 111-114 [doi]