Abstract is missing.
- ProcessorFuzz: Processor Fuzzing with Control and Status Registers GuidanceSadullah Canakci, Chathura Rajapaksha, Leila Delshadtehrani, Anoop Mysore Nataraja, Michael Bedford Taylor, Manuel Egele, Ajay Joshi. 1-12 [doi]
- Targeted Bitstream Fault Fuzzing Accelerating BiFI on Large DesignsSusanne Engels, Maik Ender, Christof Paar. 13-23 [doi]
- EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault AttacksPascal Nasahl, Salmin Sultana, Hans Liljestrand, Karanvir Grewal, Michael LeMay, David M. Durham, David Schrammel, Stefan Mangard. 24-35 [doi]
- Low-Latency Masking with Arbitrary Protection Order Based on Click ElementsMateus Simões, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad, Thomas Sarno. 36-47 [doi]
- A Low-Randomness First-Order Masked XoodyakShuohang Peng, Bohan Yang 0004, Shuying Yin, Hang Zhao, Cankun Zhao, Shaojun Wei, Leibo Liu. 48-56 [doi]
- Security Order of Gate-Level Masking SchemesSofiane Takarabt, Javad Bahrami, Mohammad Ebrahimabadi, Sylvain Guilley, Naghmeh Karimi. 57-67 [doi]
- SCALE: Secure and Scalable Cache PartitioningNadja Ramhöj Holtryd, Madhavan Manivannan, Per Stenström. 68-79 [doi]
- Advanced Covert-Channels in Modern SoCsLilian Bossuet, Carlos Andres Lara-Nino. 80-88 [doi]
- Lightweight Countermeasures Against Original Linear Code Extraction Attacks on a RISC-V CoreThéophile Gousselot, Olivier Thomas, Jean-Max Dutertre, Olivier Potin, Jean-Baptiste Rigaud. 89-99 [doi]
- CIFER: Code Integrity and control Flow verification for programs Executed on a RISC-V coreAnthony Zgheib, Olivier Potin, Jean-Baptiste Rigaud, Jean-Max Dutertre. 100-110 [doi]
- Improving Single-Trace Attacks on the Number-Theoretic Transform for Cortex-M4Guilhèm Assael, Philippe Elbaz-Vincent, Guillaume Reymond. 111-121 [doi]
- Detour: Layout-aware Reroute Attack Vulnerability Assessment and AnalysisMinyan Gao, Domenic Forte. 122-132 [doi]
- Dual Channel EM/Power Attack Using Mutual Information and its Real-time ImplementationYunkai Bai, Jungmin Park, Mark M. Tehranipoor, Domenic Forte. 133-143 [doi]
- Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage AnalysisHonggang Yu, Shuo Wang, Haoqi Shan, Maximillian Panoff, Michael Lee, Kaichen Yang, Yier Jin. 144-154 [doi]
- Hardware-Software Co-design for Side-Channel Protected Neural Network InferenceAnuj Dubey, Rosario Cammarota, Avinash Varna, Raghavan Kumar, Aydin Aysu. 155-166 [doi]
- TripletPower: Deep-Learning Side-Channel Attacks over Few TracesChenggang Wang, Jimmy Dani, Shane Reilly, Austen Brownfield, Boyang Wang, John Marty Emmert. 167-178 [doi]
- Uprooting Trust: Learnings from an Unpatchable Hardware Root-of-Trust Vulnerability in Siemens S7-1500 PLCsYuanzhe Wu, Grant Skipper, Ang Cui. 179-190 [doi]
- OMT: A Run-time Adaptive Architectural Framework for Bonsai Merkle Tree-Based Secure Authentication with Embedded Heterogeneous MemoryRakin Muhammad Shadab, Yu Zou, Sanjay Gandham, Mingjie Lin. 191-202 [doi]
- MagHop: Magnetic Spectrum Hopping for Securing Voltage and Current Magnetic SensorsAnomadarshi Barua, Mohammad Abdullah Al Faruque. 203-214 [doi]
- Gadgets of Gadgets in Industrial Control Systems: Return Oriented Programming Attacks on PLCsAdeen Ayub, Nauman Zubair, Hyunguk Yoo, Wooyeon Jo, Irfan Ahmed 0001. 215-226 [doi]
- Disassembling Software Instruction Types through Impedance Side-channel AnalysisMd. Sadik Awal, Md Tauhidur Rahman. 227-237 [doi]
- Bits to BNNs: Reconstructing FPGA ML-IP with Joint Bitstream and Side-Channel AnalysisBrooks Olney, Robert Karam. 238-248 [doi]
- LEDA: Locking Enabled Differential Analysis of Cryptographic CircuitsDevanshi Upadhyaya, Maël Gay, Ilia Polian. 249-259 [doi]
- Design of Quantum Computer AntivirusSanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, HanRui Wang, Ferhat Erata, Song Han, Yongshan Ding 0001, Jakub Szefer. 260-270 [doi]
- Fast Fingerprinting of Cloud-based NISQ Quantum ComputersKaitlin N. Smith, Joshua Viszlai, Lennart Maximilian Seifert, Jonathan M. Baker, Jakub Szefer, Frederic T. Chong. 271-282 [doi]
- Towards Secure Classical-Quantum SystemsDaniel Volya, Tao Zhang, Nashmin Alam, Mark M. Tehranipoor, Prabhat Mishra 0001. 283-292 [doi]
- FHE-Booster: Accelerating Fully Homomorphic Execution with Fine-tuned Bootstrapping SchedulingTommy White, Charles Gouert, Chengmo Yang, Nektarios Georgios Tsoutsos. 293-303 [doi]
- Generating Lower-Cost Garbled Circuits: Logic Synthesis Can HelpMingfei Yu, Giovanni De Micheli. 304-314 [doi]
- VPP: Privacy Preserving Machine Learning via UndervoltingMd. Shohidul Islam, Behnam Omidi, Ihsen Alouani, Khaled N. Khasawneh. 315-325 [doi]
- A Privacy-Preserving Protocol Level Approach to Prevent Machine Learning Modelling Attacks on PUFs in the Presence of Semi-Honest VerifiersOwen Millwood, Hongming Fei, Prosanta Gope, Oguz Narli, Meltem Kurt Pehlivanoglu, Elif Bilge Kavun, Biplab Sikdar 0001. 326-336 [doi]