


default search action
HOST 2025: San Jose, CA, USA
- IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2025, San Jose, CA, USA, May 5-8, 2025. IEEE 2025, ISBN 979-8-3315-4198-9

- Le Wu

, Liji Wu, Zhiwei Ba, Xiangmin Zhang:
An Input Recovery Side-Channel Attack on Dnn Accelerator with Three-Dimensional Power Surface. 1-11 - Ruyi Ding, Cheng Gongye, Davis Ranney, Aidong Adam Ding, Yunsi Fei:

MACPruning: Dynamic Operation Pruning to Mitigate Side-Channel DNN Model Extraction. 12-22 - Nina Shamsi, Yan Long, Kevin Fu:

Eyehearyou: Probing Location Identification Via Occluded Smartphone Cameras and Ultrasound. 23-34 - Hugo Perrin, Jean-Max Dutertre, Jean-Baptiste Rigaud:

Betrayed by Light: How Photon Emission Microscopy Empowers Register Bit-Level Laser Attacks on Microcontrollers. 35-45 - Amit Mazumder Shuvo, Md Latifur Rahman, Jingbo Zhou, Farimah Farahmandi, Mark Tehranipoor:

ReFID: A System-Aware Remote Fault-Injection Attack Detection & Mitigation for Secure Heterogeneous System. 46-56 - Pantha Protim Sarker, Tianze Kan, Jingchen Liang, Ozgur Tuncer, Bo He, Zelin Lu, Sudarshan Mallu, Lang Lin, Norman Chang, Rikuu Hasegawa, Kazuki Monta, Makoto Nagata, Farimah Farahmandi, Mark Tehranipoor:

ML-EMFI: A Machine Learning-Driven Pre-Silicon Electromagnetic Fault Injection Security Evaluation for Robust IC Design. 57-66 - Yuntao Liu

, Jayden John, Qian Wang:
E-LoQ: Enhanced Locking for Quantum Circuit IP Protection. 67-77 - Satwik Kundu, Swaroop Ghosh:

STIQ: Safeguarding Training and Inferencing of Quantum Neural Networks from Untrusted Cloud. 78-87 - Donald Lushi

, Samah Mohamed Saeed:
Undermining Quantum Circuit Obfuscation: Insights from Structural Analysis. 88-98 - Muhammad Ahsan, Barry Najarro-Blancas, Johanna Tsala Ebode, Nastassja Lewinski, Irfan Ahmed

:
3D Bioprinter Firmware Attacks: Categorization, Implementation, and Impacts. 99-110 - Ryan Piersma, Tawhid Bhuiyan, Tanvir Ahmed Khan, Simha Sethumadhavan:

Reverse Engineering DVFS Mechanisms. 111-122 - Sisheng Liang, Zhengxiong Li, Zihao Zhan, Zhenkai Zhang:

FanBleed: Stealing Your Secrets via Observing Your Cooling Fan. 123-134 - Davis Ranney, Yufei Wang, A. Adam Ding, Yunsi Fei:

USBSnoop - Revealing Device Activities via USB Congestions. 135-145 - Hansika Weerasena, Prabhat Mishra:

Traffic Analysis Attacks on Wireless NoC-Based SoCs. 146-156 - Donayam Benti, Todd M. Austin:

DOME: Automated Validation of Data-Oblivious Program Execution. 157-169 - Nehal A. Mansour, Ramyapandian Vijayakanthan, Adeen Ayub

, Aisha I. Ali-Gombe
, Irfan Ahmed
:
WaveSleuth: Retrospective PLC Memory for Anomaly Detection in Industrial Control Systems. 170-181 - Muhammad Shakeel Akram, Vincent Meyers, Mehdi B. Tahoori, Bogaraju Sharatchandra Varma, Dewar Finlay:

EvoWeight: Sponge Poisoning of FPGA-Based DNN Accelerators in Differential Private Secure Federated Learning. 182-193 - Alexander Cathis, Mulong Luo, Mohit Tiwari, Andreas Gerstlauer:

LAPD: Lifecycle-Aware Power-Based Malware Detection. 194-204 - Robi Paul, Michael Zuzak:

Michscan: Black-Box Neural Network Integrity Checking at Runtime Through Power Analysis. 205-215 - Xiang Zhang, Ziyue Zhang, Aidong Adam Ding, Yunsi Fei:

AccessShadow: Leveraging Adversarial Samples to Counter Deep Learning-Assisted Cache Timing Attacks. 216-226 - Spyridon Raptis, Paul Kling, Ioannis Kaskampas, Ihsen Alouani

, Haralampos-G. Stratigopoulos:
Input-Triggered Hardware Trojan Attack on Spiking Neural Networks. 227-238 - Dipali Jain, Shakil Ahmed, Guangwei Zhao, Rajesh Datta, Kaveh Shamsi

:
Trojan Localization in Generic AMS Circuits from Combined Power and Functional Queries. 239-249 - Ruochen Dai, Zhaoxiang Liu, Orlando Arias, Xiaolong Guo, Tuba Yavuz:

Evaluating the Effectiveness of Hardware Trojan Detection Approaches at RTL. 250-260 - Hayato Ide, Shohei Matsumoto, Taiki Kitazawa, Shugo Kaji, Daisuke Fujimoto, Takashi Kasuga, Yuichi Hayashi:

Amplifying Electromagnetic Leakage by Hardware Trojans Through Cable Geometry Manipulation. 261-267 - Md Sadman Siraj, Aisha B. Rahman

, Cyrus Minwalla, Eirini Eleni Tsiropoulou, Jim Plusquellic:
Sourcing Trust From Peers with Physical Unclonable Functions. 268-278 - Florian Pebay-Peyroula, Licinius-Pompiliu Benea, Mikael Carmona, Romain Wacquez:

On the Impact of Metastability in Jitter Based TRNG. 279-288 - Jens Nöpel, Tim Music, Niklas Stein, Christoph Frisch, Michael Pehl:

Quantization Schemes for PUFs: The Entropy-Area Trade-Off. 289-299 - Andrew Gan, Setsuna Yuki

, Timothy Rogers, Zahra Ghodsi:
Cuot: Accelerating Oblivious Transfer on Gpus for Privacy-Preserving Computation. 300-311 - Martin Unterguggenberger

, David Schrammel, Lukas Maar, Lukas Lamster, Vedad Hadzic, Stefan Mangard
:
Cryptographic Least Privilege Enforcement for Scalable Memory Isolation. 312-323 - Rostin Shokri, Nektarios Georgios Tsoutsos:

CHESS: Compiling Homomorphic Encryption with Scheme Switching. 324-334 - Shams Tarek, Dipayan Saha

, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi:
SoCureLLM: An LLM-Driven Approach for Large-Scale System-on-Chip Security Verification and Policy Generation. 335-345 - Erika A. Leal, Mengfei Ren

, Shijia Li, Jiang Ming:
Low-Entropy Packed Binary Detection via Accurate Hardware Events Profiling. 346-357 - Raphael Götz, Christoph Sendner, Nico Ruck, Mohamadreza Rostami, Alexandra Dmitrienko, Ahmad-Reza Sadeghi:

RLFuzz: Accelerating Hardware Fuzzing with Deep Reinforcement Learning. 358-369 - Sulyab Thottungal Valapu, Aritri Saha, Bhaskar Krishnamachari, Vivek V. Menon, Ujjwal Guin:

Reward-Based Blockchain Infrastructure for 3D Ic Supply Chain Provenance. 370-380 - Prathamesh Nitin Tanksale, Guru Raghava S. Seethiraju, Shirshendu Das, Venkata Kalyan Tavva:

$\mathcal{RRR}$: Rethinking Randomized Remapping for High Performance Secured NVM LLC. 381-391 - Merve Karabulut

, Reza Azarderakhsh:
Efficient Cpa Attack on Hardware Implementation of Ml-Dsa in Post-Quantum Root of Trust. 392-402 - Théophile Gousselot, Jean-Max Dutertre, Olivier Potin, Jean-Baptiste Rigaud:

Code Encryption for Confidentiality and Execution Integrity Down to Control Signals. 403-414 - Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, Carl A. Gunter:

Termite Attacks: Gnawing on Logs to Extract Secret Information. 415-426 - Bethanie Williams, Rima Asmar Awad, Clifton J. Mulkey, Gabriela F. Ciocarlie, Muhammad Ismail, Kyle Saleeby:

Securing Smart Manufacturing: Detection of Cyber-Physical Attacks in CNC-Based Systems. 428-438 - Muhammad Ahsan, Irfan Ahmed

:
Wattshield: A Power Side-Channel Framework for Detecting Malicious Firmware in Fused Filament Fabrication. 438-449 - Paul Krüger, Stefan Wildermann, Jürgen Teich:

Breaking Confidentiality of XTS-AES Encrypted Data at Rest on Microprocessors Using Electromagnetic Side-Channel Attacks. 450-461 - Logan Reichling, Ryan Evans

, Mabon Ninan, Phuc Mai, Boyang Wang, Yunsi Fei, John Marty Emmert:
Micropower: Micro Neural Networks for Side-Channel Attacks. 462-473

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














