Abstract is missing.
- An Input Recovery Side-Channel Attack on Dnn Accelerator with Three-Dimensional Power SurfaceLe Wu, Liji Wu, Zhiwei Ba, Xiangmin Zhang. 1-11 [doi]
- MACPruning: Dynamic Operation Pruning to Mitigate Side-Channel DNN Model ExtractionRuyi Ding, Cheng Gongye, Davis Ranney, Aidong Adam Ding, Yunsi Fei. 12-22 [doi]
- Eyehearyou: Probing Location Identification Via Occluded Smartphone Cameras and UltrasoundNina Shamsi, Yan Long, Kevin Fu. 23-34 [doi]
- Betrayed by Light: How Photon Emission Microscopy Empowers Register Bit-Level Laser Attacks on MicrocontrollersHugo Perrin, Jean-Max Dutertre, Jean-Baptiste Rigaud. 35-45 [doi]
- ReFID: A System-Aware Remote Fault-Injection Attack Detection & Mitigation for Secure Heterogeneous SystemAmit Mazumder Shuvo, Md Latifur Rahman, Jingbo Zhou, Farimah Farahmandi, Mark M. Tehranipoor. 46-56 [doi]
- ML-EMFI: A Machine Learning-Driven Pre-Silicon Electromagnetic Fault Injection Security Evaluation for Robust IC DesignPantha Protim Sarker, Tianze Kan, Jingchen Liang, Ozgur Tuncer, Bo He, Zelin Lu, Sudarshan Mallu, Lang Lin, Norman Chang, Rikuu Hasegawa, Kazuki Monta, Makoto Nagata, Farimah Farahmandi, Mark M. Tehranipoor. 57-66 [doi]
- E-LoQ: Enhanced Locking for Quantum Circuit IP ProtectionYuntao Liu, Jayden John, Qian Wang. 67-77 [doi]
- STIQ: Safeguarding Training and Inferencing of Quantum Neural Networks from Untrusted CloudSatwik Kundu, Swaroop Ghosh. 78-87 [doi]
- Undermining Quantum Circuit Obfuscation: Insights from Structural AnalysisDonald Lushi, Samah Mohamed Saeed. 88-98 [doi]
- 3D Bioprinter Firmware Attacks: Categorization, Implementation, and ImpactsMuhammad Ahsan, Barry Najarro-Blancas, Johanna Tsala Ebode, Nastassja Lewinski, Irfan Ahmed 0001. 99-110 [doi]
- Reverse Engineering DVFS MechanismsRyan Piersma, Tawhid Bhuiyan, Tanvir Ahmed Khan, Simha Sethumadhavan. 111-122 [doi]
- FanBleed: Stealing Your Secrets via Observing Your Cooling FanSisheng Liang, Zhengxiong Li, Zihao Zhan, Zhenkai Zhang 0002. 123-134 [doi]
- USBSnoop - Revealing Device Activities via USB CongestionsDavis Ranney, Yufei Wang, A. Adam Ding, Yunsi Fei. 135-145 [doi]
- Traffic Analysis Attacks on Wireless NoC-Based SoCsHansika Weerasena, Prabhat Mishra 0001. 146-156 [doi]
- DOME: Automated Validation of Data-Oblivious Program ExecutionDonayam Benti, Todd M. Austin. 157-169 [doi]
- WaveSleuth: Retrospective PLC Memory for Anomaly Detection in Industrial Control SystemsNehal A. Mansour, Ramyapandian Vijayakanthan, Adeen Ayub, Aisha I. Ali-Gombe, Irfan Ahmed 0001. 170-181 [doi]
- EvoWeight: Sponge Poisoning of FPGA-Based DNN Accelerators in Differential Private Secure Federated LearningMuhammad Shakeel Akram, Vincent Meyers, Mehdi B. Tahoori, Bogaraju Sharatchandra Varma, Dewar Finlay. 182-193 [doi]
- LAPD: Lifecycle-Aware Power-Based Malware DetectionAlexander Cathis, Mulong Luo, Mohit Tiwari, Andreas Gerstlauer. 194-204 [doi]
- Michscan: Black-Box Neural Network Integrity Checking at Runtime Through Power AnalysisRobi Paul, Michael Zuzak. 205-215 [doi]
- AccessShadow: Leveraging Adversarial Samples to Counter Deep Learning-Assisted Cache Timing AttacksXiang Zhang, Ziyue Zhang, Aidong Adam Ding, Yunsi Fei. 216-226 [doi]
- Input-Triggered Hardware Trojan Attack on Spiking Neural NetworksSpyridon Raptis, Paul Kling, Ioannis Kaskampas, Ihsen Alouani, Haralampos-G. Stratigopoulos. 227-238 [doi]
- Trojan Localization in Generic AMS Circuits from Combined Power and Functional QueriesDipali Jain, Shakil Ahmed, Guangwei Zhao, Rajesh Datta, Kaveh Shamsi. 239-249 [doi]
- Evaluating the Effectiveness of Hardware Trojan Detection Approaches at RTLRuochen Dai, Zhaoxiang Liu, Orlando Arias, Xiaolong Guo, Tuba Yavuz. 250-260 [doi]
- Amplifying Electromagnetic Leakage by Hardware Trojans Through Cable Geometry ManipulationHayato Ide, Shohei Matsumoto, Taiki Kitazawa, Shugo Kaji, Daisuke Fujimoto, Takashi Kasuga, Yuichi Hayashi. 261-267 [doi]
- Sourcing Trust From Peers with Physical Unclonable FunctionsMd. Sadman Siraj, Aisha B. Rahman, Cyrus Minwalla, Eirini-Eleni Tsiropoulou, Jim Plusquellic. 268-278 [doi]
- On the Impact of Metastability in Jitter Based TRNGFlorian Pebay-Peyroula, Licinius-Pompiliu Benea, Mikael Carmona, Romain Wacquez. 279-288 [doi]
- Quantization Schemes for PUFs: The Entropy-Area Trade-OffJens Nöpel, Tim Music, Niklas Stein, Christoph Frisch, Michael Pehl. 289-299 [doi]
- Cuot: Accelerating Oblivious Transfer on Gpus for Privacy-Preserving ComputationAndrew Gan, Setsuna Yuki, Timothy Rogers, Zahra Ghodsi. 300-311 [doi]
- Cryptographic Least Privilege Enforcement for Scalable Memory IsolationMartin Unterguggenberger, David Schrammel, Lukas Maar, Lukas Lamster, Vedad Hadzic, Stefan Mangard. 312-323 [doi]
- CHESS: Compiling Homomorphic Encryption with Scheme SwitchingRostin Shokri, Nektarios Georgios Tsoutsos. 324-334 [doi]
- SoCureLLM: An LLM-Driven Approach for Large-Scale System-on-Chip Security Verification and Policy GenerationShams Tarek, Dipayan Saha, Sujan Kumar Saha, Mark M. Tehranipoor, Farimah Farahmandi. 335-345 [doi]
- Low-Entropy Packed Binary Detection via Accurate Hardware Events ProfilingErika A. Leal, Mengfei Ren 0001, Shijia Li, Jiang Ming 0002. 346-357 [doi]
- RLFuzz: Accelerating Hardware Fuzzing with Deep Reinforcement LearningRaphael Götz, Christoph Sendner, Nico Ruck, Mohamadreza Rostami, Alexandra Dmitrienko, Ahmad-Reza Sadeghi. 358-369 [doi]
- Reward-Based Blockchain Infrastructure for 3D Ic Supply Chain ProvenanceSulyab Thottungal Valapu, Aritri Saha, Bhaskar Krishnamachari, Vivek V. Menon, Ujjwal Guin. 370-380 [doi]
- $\mathcal{RRR}$: Rethinking Randomized Remapping for High Performance Secured NVM LLCPrathamesh Nitin Tanksale, Guru Raghava S. Seethiraju, Shirshendu Das, Venkata Kalyan Tavva. 381-391 [doi]
- Efficient Cpa Attack on Hardware Implementation of Ml-Dsa in Post-Quantum Root of TrustMerve Karabulut, Reza Azarderakhsh. 392-402 [doi]
- Code Encryption for Confidentiality and Execution Integrity Down to Control SignalsThéophile Gousselot, Jean-Max Dutertre, Olivier Potin, Jean-Baptiste Rigaud. 403-414 [doi]
- Termite Attacks: Gnawing on Logs to Extract Secret InformationHyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, Carl A. Gunter. 415-426 [doi]
- Securing Smart Manufacturing: Detection of Cyber-Physical Attacks in CNC-Based SystemsBethanie Williams, Rima Asmar Awad, Clifton J. Mulkey, Gabriela F. Ciocarlie, Muhammad Ismail, Kyle Saleeby. 428-438 [doi]
- Wattshield: A Power Side-Channel Framework for Detecting Malicious Firmware in Fused Filament FabricationMuhammad Ahsan, Irfan Ahmed 0001. 438-449 [doi]
- Breaking Confidentiality of XTS-AES Encrypted Data at Rest on Microprocessors Using Electromagnetic Side-Channel AttacksPaul Krüger, Stefan Wildermann, Jürgen Teich. 450-461 [doi]
- Micropower: Micro Neural Networks for Side-Channel AttacksLogan Reichling, Ryan Evans, Mabon Ninan, Phuc Mai, Boyang Wang, Yunsi Fei, John Marty Emmert. 462-473 [doi]