Abstract is missing.
- Side-channel analysis of MAC-Keccak hardware implementationsPei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, David R. Kaeli, Miriam Leeser. 1 [doi]
- Support vector regression: exploiting machine learning techniques for leakage modelingDirmanto Jap, Marc Stöttinger, Shivam Bhasin. 2 [doi]
- Towards a practical solution to detect code reuse attacks on ARM mobile devicesYongje Lee, Ingoo Heo, Dongil Hwang, Kyungmin Kim, Yunheung Paek. 3 [doi]
- Can randomized mapping secure instruction caches from side-channel attacks?Fangfei Liu, Hao Wu, Ruby B. Lee. 4 [doi]
- Covert channels through branch predictors: a feasibility studyDmitry Evtyushkin, Dmitry V. Ponomarev, Nael B. Abu-Ghazaleh. 5 [doi]
- Exploring the performance implications of memory safety primitives in many-core processors executing multi-threaded workloadsMasab Ahmad, Syed Kamran Haider, Farrukh Hijaz, Marten van Dijk, Omer Khan. 6 [doi]
- Exploiting small leakages in masks to turn a second-order attack into a first-order attackAlexander DeTrano, Sylvain Guilley, Xiaofei Guo, Naghmeh Karimi, Ramesh Karri. 7 [doi]
- Hardware overhead analysis of programmability in ARX crypto processingMohamed El-Hadedy, Kevin Skadron. 8 [doi]
- Predicting program phases and defending against side-channel attacks using hardware performance countersJunaid Nomani, Jakub Szefer. 9 [doi]
- Performance optimizations of integrity checking based on Merkle treesSalaheddine Ouaarab, Guillaume Duc, Renaud Pacalet. 10 [doi]