default search action
HOST 2023: San Jose, CA, USA
- IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2023, San Jose, CA, USA, May 1-4, 2023. IEEE 2023, ISBN 979-8-3503-0062-8
- Sadullah Canakci, Chathura Rajapaksha, Leila Delshadtehrani, Anoop Mysore Nataraja, Michael Bedford Taylor, Manuel Egele, Ajay Joshi:
ProcessorFuzz: Processor Fuzzing with Control and Status Registers Guidance. 1-12 - Susanne Engels, Maik Ender, Christof Paar:
Targeted Bitstream Fault Fuzzing Accelerating BiFI on Large Designs. 13-23 - Pascal Nasahl, Salmin Sultana, Hans Liljestrand, Karanvir Grewal, Michael LeMay, David M. Durham, David Schrammel, Stefan Mangard:
EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks. 24-35 - Mateus Simões, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad, Thomas Sarno:
Low-Latency Masking with Arbitrary Protection Order Based on Click Elements. 36-47 - Shuohang Peng, Bohan Yang, Shuying Yin, Hang Zhao, Cankun Zhao, Shaojun Wei, Leibo Liu:
A Low-Randomness First-Order Masked Xoodyak. 48-56 - Sofiane Takarabt, Javad Bahrami, Mohammad Ebrahimabadi, Sylvain Guilley, Naghmeh Karimi:
Security Order of Gate-Level Masking Schemes. 57-67 - Nadja Ramhöj Holtryd, Madhavan Manivannan, Per Stenström:
SCALE: Secure and Scalable Cache Partitioning. 68-79 - Lilian Bossuet, Carlos Andres Lara-Nino:
Advanced Covert-Channels in Modern SoCs. 80-88 - Théophile Gousselot, Olivier Thomas, Jean-Max Dutertre, Olivier Potin, Jean-Baptiste Rigaud:
Lightweight Countermeasures Against Original Linear Code Extraction Attacks on a RISC-V Core. 89-99 - Anthony Zgheib, Olivier Potin, Jean-Baptiste Rigaud, Jean-Max Dutertre:
CIFER: Code Integrity and control Flow verification for programs Executed on a RISC-V core. 100-110 - Guilhèm Assael, Philippe Elbaz-Vincent, Guillaume Reymond:
Improving Single-Trace Attacks on the Number-Theoretic Transform for Cortex-M4. 111-121 - Minyan Gao, Domenic Forte:
Detour: Layout-aware Reroute Attack Vulnerability Assessment and Analysis. 122-132 - Yunkai Bai, Jungmin Park, Mark M. Tehranipoor, Domenic Forte:
Dual Channel EM/Power Attack Using Mutual Information and its Real-time Implementation. 133-143 - Honggang Yu, Shuo Wang, Haoqi Shan, Maximillian Panoff, Michael Lee, Kaichen Yang, Yier Jin:
Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage Analysis. 144-154 - Anuj Dubey, Rosario Cammarota, Avinash Varna, Raghavan Kumar, Aydin Aysu:
Hardware-Software Co-design for Side-Channel Protected Neural Network Inference. 155-166 - Chenggang Wang, Jimmy Dani, Shane Reilly, Austen Brownfield, Boyang Wang, John Marty Emmert:
TripletPower: Deep-Learning Side-Channel Attacks over Few Traces. 167-178 - Yuanzhe Wu, Grant Skipper, Ang Cui:
Uprooting Trust: Learnings from an Unpatchable Hardware Root-of-Trust Vulnerability in Siemens S7-1500 PLCs. 179-190 - Rakin Muhammad Shadab, Yu Zou, Sanjay Gandham, Mingjie Lin:
OMT: A Run-time Adaptive Architectural Framework for Bonsai Merkle Tree-Based Secure Authentication with Embedded Heterogeneous Memory. 191-202 - Anomadarshi Barua, Mohammad Abdullah Al Faruque:
MagHop: Magnetic Spectrum Hopping for Securing Voltage and Current Magnetic Sensors. 203-214 - Adeen Ayub, Nauman Zubair, Hyunguk Yoo, Wooyeon Jo, Irfan Ahmed:
Gadgets of Gadgets in Industrial Control Systems: Return Oriented Programming Attacks on PLCs. 215-226 - Md. Sadik Awal, Md. Tauhidur Rahman:
Disassembling Software Instruction Types through Impedance Side-channel Analysis. 227-237 - Brooks Olney, Robert Karam:
Bits to BNNs: Reconstructing FPGA ML-IP with Joint Bitstream and Side-Channel Analysis. 238-248 - Devanshi Upadhyaya, Maël Gay, Ilia Polian:
LEDA: Locking Enabled Differential Analysis of Cryptographic Circuits. 249-259 - Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Hanrui Wang, Ferhat Erata, Song Han, Yongshan Ding, Jakub Szefer:
Design of Quantum Computer Antivirus. 260-270 - Kaitlin N. Smith, Joshua Viszlai, Lennart Maximilian Seifert, Jonathan M. Baker, Jakub Szefer, Frederic T. Chong:
Fast Fingerprinting of Cloud-based NISQ Quantum Computers. 271-282 - Daniel Volya, Tao Zhang, Nashmin Alam, Mark M. Tehranipoor, Prabhat Mishra:
Towards Secure Classical-Quantum Systems. 283-292 - Tommy White, Charles Gouert, Chengmo Yang, Nektarios Georgios Tsoutsos:
FHE-Booster: Accelerating Fully Homomorphic Execution with Fine-tuned Bootstrapping Scheduling. 293-303 - Mingfei Yu, Giovanni De Micheli:
Generating Lower-Cost Garbled Circuits: Logic Synthesis Can Help. 304-314 - Md. Shohidul Islam, Behnam Omidi, Ihsen Alouani, Khaled N. Khasawneh:
VPP: Privacy Preserving Machine Learning via Undervolting. 315-325 - Owen Millwood, Hongming Fei, Prosanta Gope, Oguz Narli, Meltem Kurt Pehlivanoglu, Elif Bilge Kavun, Biplab Sikdar:
A Privacy-Preserving Protocol Level Approach to Prevent Machine Learning Modelling Attacks on PUFs in the Presence of Semi-Honest Verifiers. 326-336
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.