


default search action
HOST 2023: San Jose, CA, USA
- IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2023, San Jose, CA, USA, May 1-4, 2023. IEEE 2023, ISBN 979-8-3503-0062-8

- Sadullah Canakci, Chathura Rajapaksha, Leila Delshadtehrani, Anoop Mysore Nataraja, Michael Bedford Taylor, Manuel Egele, Ajay Joshi:

ProcessorFuzz: Processor Fuzzing with Control and Status Registers Guidance. 1-12 - Susanne Engels, Maik Ender, Christof Paar:

Targeted Bitstream Fault Fuzzing Accelerating BiFI on Large Designs. 13-23 - Pascal Nasahl, Salmin Sultana, Hans Liljestrand, Karanvir Grewal, Michael LeMay, David M. Durham

, David Schrammel, Stefan Mangard
:
EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks. 24-35 - Mateus Simões

, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad, Thomas Sarno:
Low-Latency Masking with Arbitrary Protection Order Based on Click Elements. 36-47 - Shuohang Peng, Bohan Yang

, Shuying Yin, Hang Zhao, Cankun Zhao
, Shaojun Wei, Leibo Liu:
A Low-Randomness First-Order Masked Xoodyak. 48-56 - Sofiane Takarabt, Javad Bahrami, Mohammad Ebrahimabadi, Sylvain Guilley, Naghmeh Karimi:

Security Order of Gate-Level Masking Schemes. 57-67 - Nadja Ramhöj Holtryd, Madhavan Manivannan, Per Stenström:

SCALE: Secure and Scalable Cache Partitioning. 68-79 - Lilian Bossuet, Carlos Andres Lara-Nino

:
Advanced Covert-Channels in Modern SoCs. 80-88 - Théophile Gousselot, Olivier Thomas, Jean-Max Dutertre, Olivier Potin, Jean-Baptiste Rigaud

:
Lightweight Countermeasures Against Original Linear Code Extraction Attacks on a RISC-V Core. 89-99 - Anthony Zgheib, Olivier Potin, Jean-Baptiste Rigaud, Jean-Max Dutertre:

CIFER: Code Integrity and control Flow verification for programs Executed on a RISC-V core. 100-110 - Guilhèm Assael, Philippe Elbaz-Vincent, Guillaume Reymond:

Improving Single-Trace Attacks on the Number-Theoretic Transform for Cortex-M4. 111-121 - Minyan Gao, Domenic Forte

:
Detour: Layout-aware Reroute Attack Vulnerability Assessment and Analysis. 122-132 - Yunkai Bai, Jungmin Park, Mark Tehranipoor, Domenic Forte

:
Dual Channel EM/Power Attack Using Mutual Information and its Real-time Implementation. 133-143 - Honggang Yu, Shuo Wang, Haoqi Shan, Maximillian Panoff, Michael Lee, Kaichen Yang, Yier Jin:

Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage Analysis. 144-154 - Anuj Dubey, Rosario Cammarota, Avinash Varna, Raghavan Kumar, Aydin Aysu:

Hardware-Software Co-design for Side-Channel Protected Neural Network Inference. 155-166 - Chenggang Wang, Jimmy Dani, Shane Reilly, Austen Brownfield, Boyang Wang, John Marty Emmert:

TripletPower: Deep-Learning Side-Channel Attacks over Few Traces. 167-178 - Yuanzhe Wu, Grant Skipper, Ang Cui:

Uprooting Trust: Learnings from an Unpatchable Hardware Root-of-Trust Vulnerability in Siemens S7-1500 PLCs. 179-190 - Rakin Muhammad Shadab

, Yu Zou, Sanjay Gandham, Mingjie Lin:
OMT: A Run-time Adaptive Architectural Framework for Bonsai Merkle Tree-Based Secure Authentication with Embedded Heterogeneous Memory. 191-202 - Anomadarshi Barua, Mohammad Abdullah Al Faruque:

MagHop: Magnetic Spectrum Hopping for Securing Voltage and Current Magnetic Sensors. 203-214 - Adeen Ayub

, Nauman Zubair, Hyunguk Yoo, Wooyeon Jo, Irfan Ahmed
:
Gadgets of Gadgets in Industrial Control Systems: Return Oriented Programming Attacks on PLCs. 215-226 - Md. Sadik Awal

, Md. Tauhidur Rahman:
Disassembling Software Instruction Types through Impedance Side-channel Analysis. 227-237 - Brooks Olney, Robert Karam:

Bits to BNNs: Reconstructing FPGA ML-IP with Joint Bitstream and Side-Channel Analysis. 238-248 - Devanshi Upadhyaya, Maël Gay, Ilia Polian:

LEDA: Locking Enabled Differential Analysis of Cryptographic Circuits. 249-259 - Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Hanrui Wang, Ferhat Erata, Song Han, Yongshan Ding

, Jakub Szefer:
Design of Quantum Computer Antivirus. 260-270 - Kaitlin N. Smith, Joshua Viszlai, Lennart Maximilian Seifert, Jonathan M. Baker

, Jakub Szefer, Frederic T. Chong:
Fast Fingerprinting of Cloud-based NISQ Quantum Computers. 271-282 - Daniel Volya

, Tao Zhang, Nashmin Alam, Mark Tehranipoor, Prabhat Mishra
:
Towards Secure Classical-Quantum Systems. 283-292 - Tommy White, Charles Gouert, Chengmo Yang, Nektarios Georgios Tsoutsos:

FHE-Booster: Accelerating Fully Homomorphic Execution with Fine-tuned Bootstrapping Scheduling. 293-303 - Mingfei Yu

, Giovanni De Micheli:
Generating Lower-Cost Garbled Circuits: Logic Synthesis Can Help. 304-314 - Md. Shohidul Islam, Behnam Omidi, Ihsen Alouani

, Khaled N. Khasawneh:
VPP: Privacy Preserving Machine Learning via Undervolting. 315-325 - Owen Millwood

, Hongming Fei, Prosanta Gope, Oguz Narli, Meltem Kurt Pehlivanoglu
, Elif Bilge Kavun, Biplab Sikdar:
A Privacy-Preserving Protocol Level Approach to Prevent Machine Learning Modelling Attacks on PUFs in the Presence of Semi-Honest Verifiers. 326-336

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














