Abstract is missing.
- Towards Remote Verifiable Computation without Digital SecretsMarten van Dijk. 1 [doi]
- Automating Cryptographic Code GenerationYuval Yarom. 3 [doi]
- Leveraging Layout-based Effects for Locking Analog ICsMuayad J. Aljafar, Florence Azaïs, Marie-Lise Flottes, Samuel Pagliarini. 5-13 [doi]
- SpecDefender: Transient Execution Attack Defender using Performance CountersAmit Choudhari, Sylvain Guilley, Khaled Karray. 15-24 [doi]
- Differential Fault Attack on PHOTON-BeetleAmit Jana, Goutam Paul 0001. 25-34 [doi]
- Secure FMCW LiDAR Systems with Frequency EncryptionMarziyeh Rezaei, Liban Hussein, Sajjad Moazeni. 35-43 [doi]
- Breaking KASLR on Mobile Devices without Any Use of Cache MemoryMilad Seddigh, Mahdi Esfahani, Sarani Bhattacharya, Mohammad Reza Aref, Hadi Soleimany. 45-54 [doi]
- On-Chip Side-Channel Analysis of the Loop PUFLars Tebelmann, Moritz Wettermann, Michael Pehl. 55-63 [doi]
- Putting IMT to the Test: Revisiting and Expanding Interval Matching Techniques and their Calibration for SCAJens Trautmann 0001, Nikolaos Patsiatzis, Andreas Becher, Stefan Wildermann, Jürgen Teich. 65-74 [doi]
- Injecting Permanent Faults into the Flash Memory of a Microcontroller with Laser Illumination During Read OperationsRaphael Viera, Jean-Max Dutertre, Rodrigo Silva Lima. 75-84 [doi]
- To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based SignaturesAlexander Wagner, Felix Oberhansl, Marc Schink. 85-94 [doi]
- Exposing Side-Channel Leakage of SEAL Homomorphic Encryption LibraryFurkan Aydin, Aydin Aysu. 95-100 [doi]
- PR Crisis: Analyzing and Fixing Partial Reconfiguration in Multi-Tenant Cloud FPGAsEmre Karabulut, Chandu Yuvarajappa, Mohammed Iliyas Shaik, Seetal Potluri, Amro Awad, Aydin Aysu. 101-106 [doi]