Abstract is missing.
- Extending FPGA Information Leaks with Trojan Phantom CircuitsAnthony Etim, Shanquan Tian, Jakub Szefer. 1-10 [doi]
- Tail Victims in Termination Timing Channel Defenses Beyond Cryptographic KernelsShijia Wei, Austin Harris 0001, Yongye Zhu, Prakash Ramrakhyani, Calvin Lin, Mohit Tiwari. 11-22 [doi]
- Channelizer: Explainable ML Inference for Validating Side-Channel Resistant SystemsDonayam Benti, Todd M. Austin. 23-34 [doi]
- Beyond the Bridge: Contention-Based Covert and Side Channel Attacks on Multi-GPU InterconnectYicheng Zhang, Ravan Nazaraliyev, Sankha Baran Dutta, Nael B. Abu-Ghazaleh, Andres Marquez, Kevin J. Barker. 35-36 [doi]
- INTERFACE: An Indirect, Partitioned, Random, Fully-Associative Cache to Avoid Shared Last-Level Cache AttacksYonas Kelemework, Alaa R. Alameldeen. 37-49 [doi]
- Maya: Hardware Enhanced Customizable Defenses at the User-Kernel InterfacePreet Derasari, Guru Venkataramani. 50-61 [doi]
- A First Exploration of Fine-Grain Coherence for Integrity MetadataPer Ekemark, Alberto Ros 0001, Konstantinos Sagonas, Stefanos Kaxiras. 62-72 [doi]
- Extending and Defending Attacks on Reset Operations in Quantum ComputersJerry Tan, Chuanqi Xu, Theodoros Trochatos, Jakub Szefer. 73-83 [doi]
- SSE: Security Service Engines to Scale Enclave Parallelism for System Interactive ApplicationsJared Nye, Usman Ali, Omer Khan. 84-95 [doi]
- Trusted Execution Environments in Embedded and IoT Systems: A CactiLab PerspectiveZiming Zhao 0001, Md. Armanuzzaman, Xi Tan 0002, Zheyuan Ma. 96-106 [doi]
- SoK: A Comparison Study of Arm TrustZone and CCAHaoyang Huang, Fengwei Zhang, Shoumeng Yan, Tao Wei, Zhengyu He. 107-118 [doi]
- CiFHER: A Chiplet-Based FHE Accelerator with a Resizable StructureSangpyo Kim, Jongmin Kim 0007, Jaeyoung Choi, Jung Ho Ahn. 119-130 [doi]
- LOaPP: Improving the Performance of Persistent Memory Objects via Low-Overhead at-Rest PMO ProtectionDerrick Greenspan, Naveed Ul Mustafa, Andres Delgado, Connor Bramham, Christopher Prats, Samu Wallace, Mark Heinrich, Yan Solihin. 131-142 [doi]
- SoK: Opportunities for Accelerating Multi - Party Computation via Trusted HardwareTong Liu, Zhen Huang, Jiaao Li, Jianyu Niu, Guoxing Chen, Yinqian Zhang. 143-154 [doi]
- Aggregate Encryption Individual Decryption for FPGA Bitstream Protection on CloudMukta Debnath, Krishnendu Guha, Debasri Saha, Susmita Sur-Kolay. 155-166 [doi]