Abstract is missing.
- Cloak & Co-locate: Adversarial Railroading of Resource Sharing-based Attacks on the CloudHosein Mohammadi Makrani, Hossein Sayadi, Najmeh Nazari, Khaled N. Khasawneh, Avesta Sasan, Setareh Rafatirad, Houman Homayoun. 1-13 [doi]
- Seeds of SEED: A Side-Channel Resilient Cache Skewed by a Linear Function over a Galois FieldScott Constable, Thomas Unterluggauer. 14-21 [doi]
- Seeds of SEED: R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change MemoriesMd Hafizul Islam Chowdhuryy, Rickard Ewetz, Amro Awad, Fan Yao. 22-28 [doi]
- 2Cache: Building a Hybrid Randomized Cache Hierarchy for Mitigating Cache Side-Channel AttacksXingjian Zhang, Ziqi Yuan, Rui Chang, Yajin Zhou. 29-36 [doi]
- Bespoke Cache Enclaves: Fine-Grained and Scalable Isolation from Cache Side-Channels via Flexible Set-PartitioningGururaj Saileshwar, Sanjay Kariyappa, Moinuddin K. Qureshi. 37-49 [doi]
- Performance-Enhanced Integrity Verification for Large MemoriesYanan Guo, Andrew Zigerelli, Yueqiang Cheng, Youtao Zhang, Jun Yang 0002. 50-62 [doi]
- Seeds of SEED: Efficient Access Pattern Obfuscation for Untrusted Hybrid Memory SystemYuezhi Che, Gang Liu, Rujia Wang. 63-69 [doi]
- Seeds of SEED: H-CRAM: In-memory Homomorphic Search Accelerator using Spintronic Computational RAMM. Hüsrev Cilasun, Salonik Resch, Zamshed I. Chowdhury, Masoud Zabihi, Zhengyang Zhao, Thomas Peterson, Jian-Ping Wang, Sachin S. Sapatnekar, Ulya R. Karpuzcu. 70-75 [doi]
- Seeds of SEED: NMT-Stroke: Diverting Neural Machine Translation through Hardware-based FaultsKunbei Cai, Md Hafizul Islam Chowdhuryy, Zhenkai Zhang, Fan Yao. 76-82 [doi]
- Seeds of SEED: New Security Challenges for Persistent MemoryNaveed Ul Mustafa, Yuanchao Xu 0001, Xipeng Shen, Yan Solihin. 83-88 [doi]
- Do Not Predict - Recompute! How Value Recomputation Can Truly Boost the Performance of Invisible SpeculationChristos Sakalis, Zamshed I. Chowdhury, Shayne Wadle, Ismail Akturk, Alberto Ros, Magnus Själander, Stefanos Kaxiras, Ulya R. Karpuzcu. 89-100 [doi]
- Seeds of SEED: Preventing Priority Inversion in Instruction Scheduling to Disrupt Speculative InterferenceChristos Sakalis, Magnus Själander, Stefanos Kaxiras. 101-107 [doi]
- SoK: Hardware Defenses Against Speculative Execution AttacksGuangyuan Hu, Zecheng He, Ruby B. Lee. 108-120 [doi]
- Security analysis of confidential-compute instruction set architecture for virtualized workloadsRavi Sahita, Dror Caspi, Barry Huntley, Vincent Scarlata, Baruch Chaikin, Siddhartha Chhabra, Arie Aharon, Ido Ouziel. 121-131 [doi]
- Confidential Computing - a brave new worldDominic P. Mulligan, Gustavo Petri, Nick Spinale, Gareth Stockwell, Hugo J. M. Vincent. 132-138 [doi]
- VIP-Bench: A Benchmark Suite for Evaluating Privacy-Enhanced Computation FrameworksLauren Biernacki, Meron Zerihun Demissie, Kidus Birkayehu Workneh, Galane Basha Namomsa, Plato Gebremedhin, Fitsum Assamnew Andargie, Brandon Reagen, Todd M. Austin. 139-149 [doi]
- Context-Aware Privacy-Optimizing Address TracingDeeksha Dangwal, Zhizhou Zhang 0002, Jedidiah R. Crandall, Timothy Sherwood. 150-162 [doi]
- EPI: Efficient Pointer Integrity For Securing Embedded SystemsMohamed Tarek Ibn Ziad, Miguel A. Arroyo, Evgeny Manzhosov, Vasileios P. Kemerlis, Simha Sethumadhavan. 163-175 [doi]
- Track Conventions, Not Attack Signatures: Fortifying X86 ABI and System Call Interfaces to Mitigate Code Reuse AttacksSarp Ozdemir, Rutvik Saptarshi, Aravind Prakash, Dmitry Ponomarev 0001. 176-188 [doi]
- JAXED: Reverse Engineering DNN Architectures Leveraging JIT GEMM LibrariesMalith Jayaweera, Kaustubh Shivdikar, Yanzhi Wang, David R. Kaeli. 189-202 [doi]
- Seeds of SEED: Characterizing Enclave-level Parallelism in Secure Multicore ProcessorsBrandon D'Agostino, Omer Khan. 203-209 [doi]
- Seeds of SEED: Building and Verifying Foundationally Isolated Hardware ArchitecturesJason Oberg. 210-214 [doi]
- Implementing a Security Architecture for Safety-Critical Railway InfrastructureMichael Eckel, Don Kuzhiyelil, Christoph Krauß, Maria Zhdanova, Stefan Katzenbeisser 0001, Jasmin Cosic, Matthias Drodt, Jean-Jacques Pitrolle. 215-226 [doi]