


default search action
SEED 2021: Washington, DC, USA
- 2021 International Symposium on Secure and Private Execution Environment Design (SEED), Washington, DC, USA, September 20-21, 2021. IEEE 2021, ISBN 978-1-6654-2025-9

- Hosein Mohammadi Makrani, Hossein Sayadi, Najmeh Nazari, Khaled N. Khasawneh, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:

Cloak & Co-locate: Adversarial Railroading of Resource Sharing-based Attacks on the Cloud. 1-13 - Scott Constable, Thomas Unterluggauer:

Seeds of SEED: A Side-Channel Resilient Cache Skewed by a Linear Function over a Galois Field. 14-21 - Md Hafizul Islam Chowdhuryy

, Rickard Ewetz, Amro Awad
, Fan Yao
:
Seeds of SEED: R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change Memories. 22-28 - Xingjian Zhang, Ziqi Yuan, Rui Chang, Yajin Zhou:

Seeds of SEED: H2Cache: Building a Hybrid Randomized Cache Hierarchy for Mitigating Cache Side-Channel Attacks. 29-36 - Gururaj Saileshwar, Sanjay Kariyappa, Moinuddin K. Qureshi:

Bespoke Cache Enclaves: Fine-Grained and Scalable Isolation from Cache Side-Channels via Flexible Set-Partitioning. 37-49 - Yanan Guo

, Andrew Zigerelli, Yueqiang Cheng, Youtao Zhang, Jun Yang:
Performance-Enhanced Integrity Verification for Large Memories. 50-62 - Yuezhi Che, Gang Liu, Rujia Wang:

Seeds of SEED: Efficient Access Pattern Obfuscation for Untrusted Hybrid Memory System. 63-69 - M. Hüsrev Cilasun, Salonik Resch, Zamshed I. Chowdhury, Masoud Zabihi, Zhengyang Zhao, Thomas Peterson, Jian-Ping Wang, Sachin S. Sapatnekar, Ulya R. Karpuzcu:

Seeds of SEED: H-CRAM: In-memory Homomorphic Search Accelerator using Spintronic Computational RAM. 70-75 - Kunbei Cai

, Md Hafizul Islam Chowdhuryy
, Zhenkai Zhang, Fan Yao
:
Seeds of SEED: NMT-Stroke: Diverting Neural Machine Translation through Hardware-based Faults. 76-82 - Naveed Ul Mustafa

, Yuanchao Xu, Xipeng Shen
, Yan Solihin:
Seeds of SEED: New Security Challenges for Persistent Memory. 83-88 - Christos Sakalis, Zamshed I. Chowdhury, Shayne Wadle, Ismail Akturk, Alberto Ros

, Magnus Själander
, Stefanos Kaxiras, Ulya R. Karpuzcu:
Do Not Predict - Recompute! How Value Recomputation Can Truly Boost the Performance of Invisible Speculation. 89-100 - Christos Sakalis, Magnus Själander

, Stefanos Kaxiras:
Seeds of SEED: Preventing Priority Inversion in Instruction Scheduling to Disrupt Speculative Interference. 101-107 - Guangyuan Hu

, Zecheng He, Ruby B. Lee:
SoK: Hardware Defenses Against Speculative Execution Attacks. 108-120 - Ravi Sahita, Dror Caspi, Barry Huntley, Vincent Scarlata, Baruch Chaikin, Siddhartha Chhabra, Arie Aharon, Ido Ouziel:

Security analysis of confidential-compute instruction set architecture for virtualized workloads. 121-131 - Dominic P. Mulligan, Gustavo Petri, Nick Spinale, Gareth Stockwell, Hugo J. M. Vincent:

Confidential Computing - a brave new world. 132-138 - Lauren Biernacki

, Meron Zerihun Demissie
, Kidus Birkayehu Workneh, Galane Basha Namomsa
, Plato Gebremedhin, Fitsum Assamnew Andargie
, Brandon Reagen
, Todd M. Austin:
VIP-Bench: A Benchmark Suite for Evaluating Privacy-Enhanced Computation Frameworks. 139-149 - Deeksha Dangwal, Zhizhou Zhang

, Jedidiah R. Crandall
, Timothy Sherwood
:
Context-Aware Privacy-Optimizing Address Tracing. 150-162 - Mohamed Tarek Ibn Ziad

, Miguel A. Arroyo, Evgeny Manzhosov, Vasileios P. Kemerlis
, Simha Sethumadhavan:
EPI: Efficient Pointer Integrity For Securing Embedded Systems. 163-175 - Sarp Özdemir

, Rutvik Saptarshi, Aravind Prakash, Dmitry Ponomarev:
Track Conventions, Not Attack Signatures: Fortifying X86 ABI and System Call Interfaces to Mitigate Code Reuse Attacks. 176-188 - Malith Jayaweera, Kaustubh Shivdikar

, Yanzhi Wang, David R. Kaeli:
JAXED: Reverse Engineering DNN Architectures Leveraging JIT GEMM Libraries. 189-202 - Brandon D'Agostino

, Omer Khan:
Seeds of SEED: Characterizing Enclave-level Parallelism in Secure Multicore Processors. 203-209 - Jason Oberg:

Seeds of SEED: Building and Verifying Foundationally Isolated Hardware Architectures. 210-214 - Michael Eckel

, Don Kuzhiyelil, Christoph Krauß
, Maria Zhdanova
, Stefan Katzenbeisser, Jasmin Cosic
, Matthias Drodt, Jean-Jacques Pitrolle:
Implementing a Security Architecture for Safety-Critical Railway Infrastructure. 215-226

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














