Abstract is missing.
- Non-Invasive Attack on Ring Oscillator-Based PUFs Through Localized X-Ray IrradiationNasr-Eddine Ouldei Tebina, Aghiles Douadi, Luc Salvo, Vincent Beroulle, Nacer-Eddine Zergainoh, Guillaume Hubert, Elena Ioana Vatajelu, Giorgio Di Natale, Paolo Maistri. 1-11 [doi]
- LightEMU: Hardware Assisted Fuzzing of Trusted ApplicationsHaoqi Shan, Sravani Nissankararao, Yujia Liu, Moyao Huang, Shuo Wang 0003, Yier Jin, Dean Sullivan. 1-11 [doi]
- TrustZoneTunnel: A Cross-World Pattern History Table-Based Microarchitectural Side-Channel AttackTianhong Xu, Aidong Adam Ding, Yunsi Fei. 1-11 [doi]
- QNAD: Quantum Noise Injection for Adversarial Defense in Deep Neural NetworksShamik Kundu, Navnil Choudhury, Sanjay Das, Arnab Raha, Kanad Basu. 1-11 [doi]
- Time-Aware Re-Synthesis for Secure Quantum SystemsChristian Rasmussen, Samah Mohamed Saeed. 1-6 [doi]
- A Security Assessment of Protected Execute-Only Firmware in Microcontrollers Through Selective Chemical EngravingXiaomei Zeng, Liu Qing, Samuel Chef, Chee Lip Gan. 12-20 [doi]
- NoiseHopper: Emission Hopping Air-Gap Covert Side Channel with Lower Probability of DetectionMd Faizul Bari, Shreyas Sen. 21-32 [doi]
- Verifying Memory Confidentiality and Integrity of Intel TDX Trusted Execution EnvironmentsHasini Witharana, Debapriya Chatterjee, Prabhat Mishra 0001. 44-54 [doi]
- A Thorough Study of State Leakage Mitigation in Quantum Computing with One-Time PadChuanqi Xu, Jamie Sikora, Jakub Szefer. 55-65 [doi]
- A Pre-Silicon Physical Design Study Towards Mitigating EMSCA on Cryptographic ICsMark Lee, Chris Clark, Saibal Mukhopadhyay. 66-69 [doi]
- Breaking SCA-Protected CRYSTALS-Kyber with a Single TraceSönke Jendral, Kalle Ngo, Ruize Wang, Elena Dubrova. 70-73 [doi]
- Voltage Noise-Based Adversarial Attacks on Machine Learning Inference in Multi-Tenant FPGA AcceleratorsSaikat Majumdar, Radu Teodorescu. 80-85 [doi]
- Cache Wars: A Comparative Study of UMWAIT, UMONITOR, and Prime-Probe AttacksUpasana Mandal, Sarani Bhattacharya, Debdeep Mukhopadhyay. 86-89 [doi]
- A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital SignatureEmre Karabulut, Aydin Aysu. 90-100 [doi]
- Covert Communication Channels Based On Hardware Trojans: Open-Source Dataset and AI-Based DetectionAlán Rodrigo Díaz Rizo, Abdelrahman Emad Abdelazim, Hassan Aboushady, Haralampos-G. Stratigopoulos. 101-106 [doi]
- Photon Emission Modeling and Machine-Learning Assisted Pre-Silicon Optical Side-Channel SimulationHenian Li, Lang Lin, Norman Chang, Sreeja Chowdhury, Dylan Mcguire, Bozidar Novakovic, Kazuki Monta, Makoto Nagata, Ying Shiun Li, Pramod M. S, Piin-Chen Yeh, J.-S. Roger Jang, Chengjie Xi, Qiutong Jin, Navid Asadi, Mark M. Tehranipoor. 107-111 [doi]
- DOMREP IIMatthias Probst, Manuel Brosch, Michael Gruber, Georg Sigl. 112-121 [doi]
- Trained to Leak: Hiding Trojan Side-Channels in Neural Network WeightsVincent Meyers, Michael Hefenbrock, Dennis Gnad, Mehdi B. Tahoori. 122-127 [doi]
- Prioritizing Information Flow Violations: Generation of Ranked Security Assertions for Hardware DesignsAvinash Ayalasomayajula, Nusrat Farzana, Debjit Pal, Farimah Farahmandi. 128-138 [doi]
- SNOW-SCA: ML-Assisted Side-Channel Attack on SNOW-VHarshit Saurabh, Anupam Golder, Samarth Shivakumar Titti, Suparna Kundu, Chaoyun Li, Angshuman Karmakar, Debayan Das. 139-149 [doi]
- Sparse Polynomial Multiplication-Based High-Performance Hardware Implementation for CRYSTALS-DilithiumHang Zhao, Cankun Zhao, Wenping Zhu, Bohan Yang 0004, Shaojun Wei, Leibo Liu. 150-159 [doi]
- Explainability to the Rescue: A Pattern-Based Approach for Detecting Adversarial AttacksSanjay Das, Shamik Kundu, Kanad Basu. 160-170 [doi]
- RTL-Spec: RTL Spectrum Analysis for Security Bug LocalizationSamit Shahnawaz Miftah, Shamik Kundu, Austin Mordahl, Shiyi Wei, Kanad Basu. 171-181 [doi]
- Charlie, Charlie, Charlie on Industrial Control Systems: PLC Control Logic Attacks by Design, Not by ChanceAdeen Ayub, Wooyeon Jo, Irfan Ahmed 0001. 182-193 [doi]
- FitBit: Ensuring Robust and Secure Execution Through Runtime-Generated StressmarksKarthik Swaminathan, Ramon Bertran, Alper Buyuktosunoglu, Pradip Bose. 194-198 [doi]
- Security Aspects of Masking on FPGAsBarbara Gigerl, Kevin Pretterhofer, Stefan Mangard. 199-210 [doi]
- Calibratable Polymorphic Temperature Sensor for Detecting Fault Injection and Side-Channel AttacksTasnuva Farheen, Sourav Roy, Jia Di, Shahin Tajik, Domenic Forte. 211-221 [doi]
- LightFAt: Mitigating Control-Flow Explosion via Lightweight PMU-Based Control-Flow AttestationJeferson González-Gómez, Hassan Nassar, Lars Bauer, Jörg Henkel. 222-226 [doi]
- DOSCrack: Deobfuscation Using Oracle-Guided Symbolic Execution and Clustering of Binary Security KeysJiaming Wu, Olivia P. Dizon-Paradis, M. Sazadur Rahman, Damon L. Woodard, Domenic Forte. 227-232 [doi]
- Empowering Hardware Security with LLM: The Development of a Vulnerable Hardware DatabaseDipayan Saha, Katayoon Yahyaei, Sujan Kumar Saha, Mark M. Tehranipoor, Farimah Farahmandi. 233-243 [doi]
- SpongePUF: A Modeling Attack Resilient Strong PUF with Scalable Challenge Response PairZhenzhe Chen, Takashi Sato, Hirofumi Shinohara. 244-253 [doi]
- Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware TrojansAthanasios Moschos, Fabian Monrose, Angelos D. Keromytis. 254-259 [doi]
- DiSPEL: A Framework for SoC Security Policy Synthesis and Distributed EnforcementSudipta Paria, Aritra Dasgupta, Swarup Bhunia. 271-281 [doi]
- Randomization Approaches for Secure SAR ADC Design Resilient Against Power Side-Channel AttacksSumanth N. Karanth, Sirish Oruganti, Meizhi Wang, Jaydeep P. Kulkarni. 282-292 [doi]
- Masked Memory Primitive for Key Insulated SchemesZachary DiMeglio, Jenna Bustami, Deniz Gurevin, Chenglu Jin, Marten van Dijk, Omer Khan. 293-303 [doi]
- CTR+: A High-Performance Metadata Access Scheme for Secure Embedded Memory in Heterogeneous Computing SystemsRakin Muhammad Shadab, Yu Zou, Mingjie Lin. 304-308 [doi]
- PhenoAuth: A Novel PUF-Phenotype-Based Authentication Protocol for IoT DevicesHongming Fei, Owen Millwood, Prosanta Gope, Jack Miskelly, Biplab Sikdar 0001. 309-319 [doi]
- TinyPower: Side-Channel Attacks with Tiny Neural NetworksHaiPeng Li, Mabon Ninan, Boyang Wang, John Marty Emmert. 320-331 [doi]
- One Flip Away from Chaos: Unraveling Single Points of Failure in Quantized DNN sCheng Gongye, Yunsi Fei. 332-342 [doi]
- A Lightweight Non-Oscillatory Delay-Sensor for Remote Power AnalysisAnis Fellah-Touta, Lilian Bossuet, Carlos Andres Lara-Nino. 343-348 [doi]
- Rowhammer Cache: A Last-Level Cache for Low-Overhead Rowhammer TrackingAman Singh, Biswabandan Panda. 349-360 [doi]
- Machine Learning Attacks on Challenge-Response Obfuscations in Strong PUFsNeelofar Hassan, Urbi Chatterjee. 361-372 [doi]
- Data-Oblivious ML Accelerators Using Hardware Security ExtensionsHossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan. 373-377 [doi]
- Too Hot to Handle: Novel Thermal Side-Channel in Power Attack-Protected Intel ProcessorsNimish Mishra, Tridib Lochan Dutta, Shubhi Shukla, Anirban Chakraborty 0003, Debdeep Mukhopadhyay. 378-382 [doi]
- MaliGNNoma: GNN-Based Malicious Circuit Classifier for Secure Cloud FPGAsLilas Alrahis, Hassan Nassar, Jonas Krautter, Dennis Gnad, Lars Bauer, Jörg Henkel, Mehdi B. Tahoori. 383-393 [doi]
- Resurrection Attack: Defeating Xilinx MPU's Memory ProtectionBharadwaj Madabhushi, Chandra Sekhar Mummidi, Sandip Kundu, Daniel E. Holcomb. 394-403 [doi]
- Dynamic Pulse Switching for Protection of Quantum Computation on Untrusted CloudsTheodoros Trochatos, Sanjay Deshpande, Chuanqi Xu, Yao Lu, Yongshan Ding 0001, Jakub Szefer. 404-414 [doi]
- All Your Base Are Belong To Us: Stealing VRP Secrets from Quantum Circuit StructuresJessie Chen, Jakub Szefer. 415-419 [doi]
- A High Efficiency Hardware Design for the Post-Quantum KEM HQCFrancesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella. 431-441 [doi]