


default search action
HOST 2024: Tysons Corner, VA, USA
- IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, Tysons Corner, VA, USA, May 6-9, 2024. IEEE 2024, ISBN 979-8-3503-7394-3

- Haoqi Shan, Sravani Nissankararao, Yujia Liu, Moyao Huang, Shuo Wang, Yier Jin, Dean Sullivan:

LightEMU: Hardware Assisted Fuzzing of Trusted Applications. 1-11 - Nasr-Eddine Ouldei Tebina, Aghiles Douadi, Luc Salvo, Vincent Beroulle, Nacer-Eddine Zergainoh, Guillaume Hubert, Elena-Ioana Vatajelu, Giorgio Di Natale, Paolo Maistri:

Non-Invasive Attack on Ring Oscillator-Based PUFs Through Localized X-Ray Irradiation. 1-11 - Christian Rasmussen, Samah Mohamed Saeed:

Time-Aware Re-Synthesis for Secure Quantum Systems. 1-6 - Tianhong Xu, Aidong Adam Ding, Yunsi Fei:

TrustZoneTunnel: A Cross-World Pattern History Table-Based Microarchitectural Side-Channel Attack. 1-11 - Shamik Kundu, Navnil Choudhury, Sanjay Das, Arnab Raha, Kanad Basu:

QNAD: Quantum Noise Injection for Adversarial Defense in Deep Neural Networks. 1-11 - Xiaomei Zeng, Qing Liu, Samuel Chef

, Chee Lip Gan:
A Security Assessment of Protected Execute-Only Firmware in Microcontrollers Through Selective Chemical Engraving. 12-20 - Md Faizul Bari, Shreyas Sen:

NoiseHopper: Emission Hopping Air-Gap Covert Side Channel with Lower Probability of Detection. 21-32 - Hasini Witharana, Debapriya Chatterjee, Prabhat Mishra:

Verifying Memory Confidentiality and Integrity of Intel TDX Trusted Execution Environments. 44-54 - Chuanqi Xu, Jamie Sikora, Jakub Szefer:

A Thorough Study of State Leakage Mitigation in Quantum Computing with One-Time Pad. 55-65 - Mark Lee

, Chris Clark, Saibal Mukhopadhyay:
A Pre-Silicon Physical Design Study Towards Mitigating EMSCA on Cryptographic ICs. 66-69 - Sönke Jendral, Kalle Ngo, Ruize Wang, Elena Dubrova:

Breaking SCA-Protected CRYSTALS-Kyber with a Single Trace. 70-73 - Saikat Majumdar, Radu Teodorescu:

Voltage Noise-Based Adversarial Attacks on Machine Learning Inference in Multi-Tenant FPGA Accelerators. 80-85 - Upasana Mandal, Sarani Bhattacharya, Debdeep Mukhopadhyay:

Cache Wars: A Comparative Study of UMWAIT, UMONITOR, and Prime-Probe Attacks. 86-89 - Emre Karabulut, Aydin Aysu:

A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature. 90-100 - Alán Rodrigo Díaz Rizo, Abdelrahman Emad Abdelazim, Hassan Aboushady, Haralampos-G. Stratigopoulos:

Covert Communication Channels Based On Hardware Trojans: Open-Source Dataset and AI-Based Detection. 101-106 - Henian Li, Lang Lin, Norman Chang, Sreeja Chowdhury, Dylan Mcguire, Bozidar Novakovic, Kazuki Monta, Makoto Nagata, Ying-Shiun Li, Pramod M. S, Piin-Chen Yeh, Jyh-Shing Roger Jang, Chengjie Xi, Qiutong Jin, Navid Asadi, Mark Tehranipoor:

Photon Emission Modeling and Machine-Learning Assisted Pre-Silicon Optical Side-Channel Simulation. 107-111 - Matthias Probst, Manuel Brosch, Michael Gruber, Georg Sigl:

DOMREP II. 112-121 - Vincent Meyers

, Michael Hefenbrock, Dennis Gnad
, Mehdi B. Tahoori:
Trained to Leak: Hiding Trojan Side-Channels in Neural Network Weights. 122-127 - Avinash Ayalasomayajula, Nusrat Farzana, Debjit Pal

, Farimah Farahmandi:
Prioritizing Information Flow Violations: Generation of Ranked Security Assertions for Hardware Designs. 128-138 - Harshit Saurabh, Anupam Golder, Samarth Shivakumar Titti

, Suparna Kundu
, Chaoyun Li
, Angshuman Karmakar, Debayan Das:
SNOW-SCA: ML-Assisted Side-Channel Attack on SNOW-V. 139-149 - Hang Zhao, Cankun Zhao

, Wenping Zhu, Bohan Yang, Shaojun Wei, Leibo Liu:
Sparse Polynomial Multiplication-Based High-Performance Hardware Implementation for CRYSTALS-Dilithium. 150-159 - Sanjay Das, Shamik Kundu, Kanad Basu:

Explainability to the Rescue: A Pattern-Based Approach for Detecting Adversarial Attacks. 160-170 - Samit Shahnawaz Miftah, Shamik Kundu, Austin Mordahl, Shiyi Wei, Kanad Basu:

RTL-Spec: RTL Spectrum Analysis for Security Bug Localization. 171-181 - Adeen Ayub

, Wooyeon Jo, Irfan Ahmed
:
Charlie, Charlie, Charlie on Industrial Control Systems: PLC Control Logic Attacks by Design, Not by Chance. 182-193 - Karthik Swaminathan, Ramon Bertran

, Alper Buyuktosunoglu, Pradip Bose:
FitBit: Ensuring Robust and Secure Execution Through Runtime-Generated Stressmarks. 194-198 - Barbara Gigerl, Kevin Pretterhofer, Stefan Mangard

:
Security Aspects of Masking on FPGAs. 199-210 - Tasnuva Farheen

, Sourav Roy, Jia Di, Shahin Tajik, Domenic Forte:
Calibratable Polymorphic Temperature Sensor for Detecting Fault Injection and Side-Channel Attacks. 211-221 - Jeferson González-Gómez

, Hassan Nassar
, Lars Bauer, Jörg Henkel:
LightFAt: Mitigating Control-Flow Explosion via Lightweight PMU-Based Control-Flow Attestation. 222-226 - Jiaming Wu, Olivia P. Dizon-Paradis

, M. Sazadur Rahman, Damon L. Woodard, Domenic Forte:
DOSCrack: Deobfuscation Using Oracle-Guided Symbolic Execution and Clustering of Binary Security Keys. 227-232 - Dipayan Saha

, Katayoon Yahyaei, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi:
Empowering Hardware Security with LLM: The Development of a Vulnerable Hardware Database. 233-243 - Zhenzhe Chen, Takashi Sato, Hirofumi Shinohara:

SpongePUF: A Modeling Attack Resilient Strong PUF with Scalable Challenge Response Pair. 244-253 - Athanasios Moschos, Fabian Monrose, Angelos D. Keromytis:

Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans. 254-259 - Sudipta Paria

, Aritra Dasgupta, Swarup Bhunia:
DiSPEL: A Framework for SoC Security Policy Synthesis and Distributed Enforcement. 271-281 - Sumanth N. Karanth, Sirish Oruganti, Meizhi Wang, Jaydeep P. Kulkarni:

Randomization Approaches for Secure SAR ADC Design Resilient Against Power Side-Channel Attacks. 282-292 - Zachary DiMeglio, Jenna Bustami, Deniz Gurevin, Chenglu Jin, Marten van Dijk, Omer Khan:

Masked Memory Primitive for Key Insulated Schemes. 293-303 - Rakin Muhammad Shadab

, Yu Zou, Mingjie Lin:
CTR+: A High-Performance Metadata Access Scheme for Secure Embedded Memory in Heterogeneous Computing Systems. 304-308 - Hongming Fei, Owen Millwood, Prosanta Gope, Jack Miskelly

, Biplab Sikdar:
PhenoAuth: A Novel PUF-Phenotype-Based Authentication Protocol for IoT Devices. 309-319 - Haipeng Li, Mabon Ninan, Boyang Wang, John Marty Emmert:

TinyPower: Side-Channel Attacks with Tiny Neural Networks. 320-331 - Cheng Gongye

, Yunsi Fei:
One Flip Away from Chaos: Unraveling Single Points of Failure in Quantized DNN s. 332-342 - Anis Fellah-Touta, Lilian Bossuet, Carlos Andres Lara-Nino

:
A Lightweight Non-Oscillatory Delay-Sensor for Remote Power Analysis. 343-348 - Aman Singh, Biswabandan Panda

:
Rowhammer Cache: A Last-Level Cache for Low-Overhead Rowhammer Tracking. 349-360 - Neelofar Hassan, Urbi Chatterjee:

Machine Learning Attacks on Challenge-Response Obfuscations in Strong PUFs. 361-372 - Hossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan:

Data-Oblivious ML Accelerators Using Hardware Security Extensions. 373-377 - Nimish Mishra, Tridib Lochan Dutta, Shubhi Shukla, Anirban Chakraborty, Debdeep Mukhopadhyay:

Too Hot to Handle: Novel Thermal Side-Channel in Power Attack-Protected Intel Processors. 378-382 - Lilas Alrahis

, Hassan Nassar
, Jonas Krautter, Dennis Gnad
, Lars Bauer, Jörg Henkel, Mehdi B. Tahoori:
MaliGNNoma: GNN-Based Malicious Circuit Classifier for Secure Cloud FPGAs. 383-393 - Bharadwaj Madabhushi

, Chandra Sekhar Mummidi, Sandip Kundu, Daniel E. Holcomb:
Resurrection Attack: Defeating Xilinx MPU's Memory Protection. 394-403 - Theodoros Trochatos, Sanjay Deshpande, Chuanqi Xu, Yao Lu, Yongshan Ding

, Jakub Szefer:
Dynamic Pulse Switching for Protection of Quantum Computation on Untrusted Clouds. 404-414 - Jessie Chen

, Jakub Szefer:
All Your Base Are Belong To Us: Stealing VRP Secrets from Quantum Circuit Structures. 415-419 - Francesco Antognazza

, Alessandro Barenghi
, Gerardo Pelosi
, Ruggero Susella:
A High Efficiency Hardware Design for the Post-Quantum KEM HQC. 431-441

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














