Abstract is missing.
- SEIF: Augmented Symbolic Execution for Information Flow in Hardware DesignsKaki Ryan, Matthew Gregoire, Cynthia Sturton. 1-9 [doi]
- EntryBleed: A Universal KASLR Bypass against KPTI on LinuxWilliam Liu, Joseph Ravichandran, Mengjia Yan 0001. 10-18 [doi]
- Triton: Software-Defined Threat Model for Secure Multi-Tenant ML Inference AcceleratorsSarbartha Banerjee. 19-28 [doi]
- Automated Security Analysis for Real-World IoT DevicesLelio Brun, Ichiro Hasuo, Yasushi Ono, Taro Sekiyama. 29-37 [doi]
- DINAR: Enabling Distribution Agnostic Noise Injection in Machine Learning HardwareKarthik Ganesan 0002, Viktor Karyofyllis, Julianne Attai, Ahmed Hamoda, Natalie Enright Jerger. 38-46 [doi]
- DeMiST: Detection and Mitigation of Stealthy Analog Hardware TrojansEnahoro Oriero, Faiq Khalid, Hasan Rafay Syed. 47-55 [doi]
- Data Processing Unit's Entry into Confidential ComputingReshma Lal, James B. Anderson, Andrew Jackson. 56-63 [doi]
- SoK: Fault Injection Attacks on CryptosystemsTinghung Chiu, Wenjie Xiong 0001. 64-72 [doi]
- Towards a Formally Verified Security Monitor for VM-based Confidential ComputingWojciech Ozga. 73-81 [doi]
- SoK: A First Order Survey of Quantum Supply Dynamics and Threat LandscapesSubrata Das. 82-90 [doi]
- A gem5 based Platform for Micro-Architectural Security AnalysisQuentin Forcioli, Jean-Luc Danger, Sumanta Chaudhuri. 91-99 [doi]