Search dblp for Publications

export results for "stream:conf/hasp:"

 download as .bib file

@inproceedings{DBLP:conf/hasp/0002KAHJ23,
  author       = {Karthik Ganesan and
                  Viktor Karyofyllis and
                  Julianne Attai and
                  Ahmed Hamoda and
                  Natalie Enright Jerger},
  title        = {{DINAR:} Enabling Distribution Agnostic Noise Injection in Machine
                  Learning Hardware},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {38--46},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623665},
  doi          = {10.1145/3623652.3623665},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/0002KAHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/Banerjee23,
  author       = {Sarbartha Banerjee},
  title        = {Triton: Software-Defined Threat Model for Secure Multi-Tenant {ML}
                  Inference Accelerators},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {19--28},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623672},
  doi          = {10.1145/3623652.3623672},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/Banerjee23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/BrunHOS23,
  author       = {L{\'{e}}lio Brun and
                  Ichiro Hasuo and
                  Yasushi Ono and
                  Taro Sekiyama},
  title        = {Automated Security Analysis for Real-World IoT Devices},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {29--37},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623667},
  doi          = {10.1145/3623652.3623667},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/BrunHOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/ChiuX23,
  author       = {Tinghung Chiu and
                  Wenjie Xiong},
  title        = {SoK: Fault Injection Attacks on Cryptosystems},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {64--72},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623671},
  doi          = {10.1145/3623652.3623671},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/ChiuX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/Das23,
  author       = {Subrata Das},
  title        = {SoK: {A} First Order Survey of Quantum Supply Dynamics and Threat
                  Landscapes},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {82--90},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623664},
  doi          = {10.1145/3623652.3623664},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/Das23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/ForcioliDC23,
  author       = {Quentin Forcioli and
                  Jean{-}Luc Danger and
                  Sumanta Chaudhuri},
  title        = {A gem5 based Platform for Micro-Architectural Security Analysis},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {91--99},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623674},
  doi          = {10.1145/3623652.3623674},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/ForcioliDC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/LalAJ23,
  author       = {Reshma Lal and
                  James B. Anderson and
                  Andrew Jackson},
  title        = {Data Processing Unit's Entry into Confidential Computing},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {56--63},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623670},
  doi          = {10.1145/3623652.3623670},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/LalAJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/LiuR023,
  author       = {William Liu and
                  Joseph Ravichandran and
                  Mengjia Yan},
  title        = {EntryBleed: {A} Universal {KASLR} Bypass against {KPTI} on Linux},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {10--18},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623669},
  doi          = {10.1145/3623652.3623669},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/LiuR023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/OrieroKS23,
  author       = {Enahoro Oriero and
                  Faiq Khalid and
                  Syed Rafay Hasan},
  title        = {DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {47--55},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623673},
  doi          = {10.1145/3623652.3623673},
  timestamp    = {Sat, 27 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/OrieroKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/Ozga23,
  author       = {Wojciech Ozga},
  title        = {Towards a Formally Verified Security Monitor for VM-based Confidential
                  Computing},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {73--81},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623668},
  doi          = {10.1145/3623652.3623668},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/Ozga23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/RyanGS23,
  author       = {Kaki Ryan and
                  Matthew Gregoire and
                  Cynthia Sturton},
  title        = {{SEIF:} Augmented Symbolic Execution for Information Flow in Hardware
                  Designs},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623666},
  doi          = {10.1145/3623652.3623666},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/RyanGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hasp/2023,
  title        = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652},
  doi          = {10.1145/3623652},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/BiringaBK22,
  author       = {Chidera Biringa and
                  Gaspard Baye and
                  G{\"{o}}khan Kul},
  title        = {Short Paper: Static and Microarchitectural ML-Based Approaches For
                  Detecting Spectre Vulnerabilities and Attacks},
  booktitle    = {Proceedings of the 11th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1
                  October 2022},
  pages        = {53--57},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569562.3569589},
  doi          = {10.1145/3569562.3569589},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hasp/BiringaBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/Bisheh-NiasarAA22,
  author       = {Mojtaba Bisheh{-}Niasar and
                  Mila Anastasova and
                  Abubakr Abdulgadir and
                  Hwajeong Seo and
                  Reza Azarderakhsh},
  title        = {Side-Channel Analysis and Countermeasure Design for Implementation
                  of Curve448 on Cortex-M4},
  booktitle    = {Proceedings of the 11th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1
                  October 2022},
  pages        = {10--17},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569562.3569564},
  doi          = {10.1145/3569562.3569564},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hasp/Bisheh-NiasarAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/ChenAK22,
  author       = {Xiaoyue Chen and
                  Pavlos Aimoniotis and
                  Stefanos Kaxiras},
  title        = {Clueless: {A} Tool Characterising Values Leaking as Addresses},
  booktitle    = {Proceedings of the 11th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1
                  October 2022},
  pages        = {27--34},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569562.3569566},
  doi          = {10.1145/3569562.3569566},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hasp/ChenAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/KucukMMMA22,
  author       = {Kubilay Ahmet K{\"{u}}{\c{c}}{\"{u}}k and
                  Steve Moyle and
                  Andrew Martin and
                  Alexandru Mereacre and
                  Nicholas Allott},
  title        = {SoK: How Not to Architect Your Next-Generation {TEE} Malware?},
  booktitle    = {Proceedings of the 11th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1
                  October 2022},
  pages        = {35--44},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569562.3569568},
  doi          = {10.1145/3569562.3569568},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/KucukMMMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/Naseredini0SX22,
  author       = {Amir Naseredini and
                  Martin Berger and
                  Matteo Sammartino and
                  Shale Xiong},
  title        = {{ALARM:} Active LeArning of Rowhammer Mitigations},
  booktitle    = {Proceedings of the 11th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1
                  October 2022},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569562.3569563},
  doi          = {10.1145/3569562.3569563},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hasp/Naseredini0SX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/SchillingNUM22,
  author       = {Robert Schilling and
                  Pascal Nasahl and
                  Martin Unterguggenberger and
                  Stefan Mangard},
  title        = {{SFP:} Providing System Call Flow Protection against Software and
                  Fault Attacks},
  booktitle    = {Proceedings of the 11th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1
                  October 2022},
  pages        = {18--26},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569562.3569565},
  doi          = {10.1145/3569562.3569565},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hasp/SchillingNUM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/UpadhyayG22,
  author       = {Suryansh Upadhyay and
                  Swaroop Ghosh},
  title        = {Robust and Secure Hybrid Quantum-Classical Computation on Untrusted
                  Cloud-Based Quantum Hardware},
  booktitle    = {Proceedings of the 11th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1
                  October 2022},
  pages        = {45--52},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569562.3569569},
  doi          = {10.1145/3569562.3569569},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hasp/UpadhyayG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hasp/2022,
  title        = {Proceedings of the 11th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1
                  October 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569562},
  doi          = {10.1145/3569562},
  isbn         = {978-1-4503-9871-8},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hasp/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/0004JL21,
  author       = {Tianwei Zhang and
                  Jakub Szefer and
                  Ruby B. Lee},
  title        = {Practical and Scalable Security Verification of Secure Architectures},
  booktitle    = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  pages        = {2:1--2:9},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253.3505256},
  doi          = {10.1145/3505253.3505256},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/0004JL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/ChoudhuryTF21,
  author       = {Muhtadi Choudhury and
                  Shahin Tajik and
                  Domenic Forte},
  title        = {{SPARSE:} Spatially Aware {LFI} Resilient State Machine Encoding},
  booktitle    = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253.3505254},
  doi          = {10.1145/3505253.3505254},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/ChoudhuryTF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/LiDS21,
  author       = {Allen Mi and
                  Shuwen Deng and
                  Jakub Szefer},
  title        = {Short Paper: Device- and Locality-Specific Fingerprinting of Shared
                  {NISQ} Quantum Computers},
  booktitle    = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  pages        = {7:1--7:6},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253.3505261},
  doi          = {10.1145/3505253.3505261},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/LiDS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/LiHRLNCZ21,
  author       = {Haonan Li and
                  Weijie Huang and
                  Mingde Ren and
                  Hongyi Lu and
                  Zhenyu Ning and
                  Heming Cui and
                  Fengwei Zhang},
  title        = {A Novel Memory Management for {RISC-V} Enclaves},
  booktitle    = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  pages        = {3:1--3:9},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253.3505257},
  doi          = {10.1145/3505253.3505257},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/LiHRLNCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/MohammedKSCH21,
  author       = {Hawzhin Mohammed and
                  Faiq Khalid and
                  Paul Sawyer and
                  Gabriella Cataloni and
                  Syed Rafay Hasan},
  title        = {InTrust-IoT: Intelligent Ecosystem based on Power Profiling of Trusted
                  device(s) in IoT for Hardware Trojan Detection},
  booktitle    = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  pages        = {8:1--8:8},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253.3505262},
  doi          = {10.1145/3505253.3505262},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/MohammedKSCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/ShiXCZG21,
  author       = {Rabimba Karanjai and
                  Weidong Shi and
                  Lei Xu and
                  Lin Chen and
                  Fengwei Zhang and
                  Zhimin Gao},
  title        = {Lessons Learned from Blockchain Applications of Trusted Execution
                  Environments and Implications for Future Research},
  booktitle    = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  pages        = {5:1--5:8},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253.3505259},
  doi          = {10.1145/3505253.3505259},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/ShiXCZG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/SureshAATG21,
  author       = {Aakarshitha Suresh and
                  Abdullah Ash{-}Saki and
                  Mahababul Alam and
                  Rasit Onur Topaloglu and
                  Swaroop Ghosh},
  title        = {Short Paper: {A} Quantum Circuit Obfuscation Methodology for Security
                  and Privacy},
  booktitle    = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  pages        = {6:1--6:5},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253.3505260},
  doi          = {10.1145/3505253.3505260},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/SureshAATG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/YoshidaSF21,
  author       = {Kota Yoshida and
                  Kuniyasu Suzaki and
                  Takeshi Fujino},
  title        = {Towards Trusted IoT Sensing Systems: Implementing {PUF} as Secure
                  Key Generator for Root of Trust and Message Authentication Code},
  booktitle    = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253.3505258},
  doi          = {10.1145/3505253.3505258},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/YoshidaSF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/micro/2021hasp,
  title        = {{HASP} '21: Workshop on Hardware and Architectural Support for Security
                  and Privacy, Virtual Event, 18 October 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3505253},
  doi          = {10.1145/3505253},
  isbn         = {978-1-4503-9614-1},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/2021hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/DangwalCALRT20,
  author       = {Deeksha Dangwal and
                  Meghan Cowan and
                  Armin Alaghi and
                  Vincent T. Lee and
                  Brandon Reagen and
                  Caroline Trippel},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {SoK: Opportunities for Software-Hardware-Security Codesign for Next
                  Generation Secure Computing},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {8:1--8:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458911},
  doi          = {10.1145/3458903.3458911},
  timestamp    = {Tue, 26 Oct 2021 15:43:33 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/DangwalCALRT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/DelgadoVK20,
  author       = {Brian Delgado and
                  Tejaswini Vibhute and
                  Karen L. Karavanic},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Applying the Principle of Least Privilege to System Management Interrupt
                  Handlers with the Intel {SMI} Transfer Monitor},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {4:1--4:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458907},
  doi          = {10.1145/3458903.3458907},
  timestamp    = {Tue, 26 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/DelgadoVK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/Hu0L20,
  author       = {Guangyuan Hu and
                  Tianwei Zhang and
                  Ruby B. Lee},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {6:1--6:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458909},
  doi          = {10.1145/3458903.3458909},
  timestamp    = {Tue, 26 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/Hu0L20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/Koteshwara0P20,
  author       = {Sandhya Koteshwara and
                  Manoj Kumar and
                  Pratap Pattnaik},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Analysis and Hardware Optimization of Lattice Post-Quantum Cryptography
                  Workloads},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {2:1--2:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458905},
  doi          = {10.1145/3458903.3458905},
  timestamp    = {Tue, 26 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/Koteshwara0P20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/MarkettosBBNMW20,
  author       = {A. Theodore Markettos and
                  John Baldwin and
                  Ruslan Bukin and
                  Peter G. Neumann and
                  Simon W. Moore and
                  Robert N. M. Watson},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Position Paper: Defending Direct Memory Access with {CHERI} Capabilities},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {7:1--7:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458910},
  doi          = {10.1145/3458903.3458910},
  timestamp    = {Tue, 26 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/MarkettosBBNMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/MarshallPP20,
  author       = {Ben Marshall and
                  Daniel Page and
                  Thinh Hung Pham},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Implementing the Draft {RISC-V} Scalar Cryptography Extensions},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458904},
  doi          = {10.1145/3458903.3458904},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/MarshallPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/MoraitisD20,
  author       = {Michail Moraitis and
                  Elena Dubrova},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {{FPGA} Bitstream Modification with Interconnect in Mind},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {5:1--5:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458908},
  doi          = {10.1145/3458903.3458908},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/MoraitisD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/StrupeK20,
  author       = {Fredrik Strupe and
                  Rakesh Kumar},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Uncovering Hidden Instructions in Armv8-A Implementations},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {3:1--3:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458906},
  doi          = {10.1145/3458903.3458906},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/StrupeK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/micro/2020hasp,
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903},
  doi          = {10.1145/3458903},
  isbn         = {978-1-4503-8898-6},
  timestamp    = {Tue, 26 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/2020hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/0056019,
  author       = {Xin Wang and
                  Wei Zhang},
  title        = {Cracking Randomized Coalescing Techniques with An Efficient Profiling-Based
                  Side-Channel Attack to {GPU}},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {2:1--2:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337169},
  doi          = {10.1145/3337167.3337169},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/0056019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ChakrabartiHKV19,
  author       = {Somnath Chakrabarti and
                  Matthew Hoekstra and
                  Dmitrii Kuvaiskii and
                  Mona Vij},
  title        = {Scaling Intel{\textregistered} Software Guard Extensions Applications
                  with Intel{\textregistered} {SGX} Card},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {6:1--6:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337173},
  doi          = {10.1145/3337167.3337173},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ChakrabartiHKV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/DengG0SGLDS19,
  author       = {Shuwen Deng and
                  Doguhan G{\"{u}}m{\"{u}}soglu and
                  Wenjie Xiong and
                  Sercan Sari and
                  Y. Serhan Gener and
                  Corine Lu and
                  Onur Demir and
                  Jakub Szefer},
  title        = {SecChisel Framework for Security Verification of Secure Processor
                  Architectures},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {7:1--7:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337174},
  doi          = {10.1145/3337167.3337174},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/DengG0SGLDS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/DisselkoenRWGLS19,
  author       = {Craig Disselkoen and
                  John Renner and
                  Conrad Watt and
                  Tal Garfinkel and
                  Amit Levy and
                  Deian Stefan},
  title        = {Position Paper: Progressive Memory Safety for WebAssembly},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337171},
  doi          = {10.1145/3337167.3337171},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/DisselkoenRWGLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ShanbhogueGS19,
  author       = {Vedvyas Shanbhogue and
                  Deepak Gupta and
                  Ravi Sahita},
  title        = {Security Analysis of Processor Instruction Set Architecture for Enforcing
                  Control-Flow Integrity},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {8:1--8:11},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337175},
  doi          = {10.1145/3337167.3337175},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ShanbhogueGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ShimizuTJP19,
  author       = {Atsuko Shimizu and
                  Daniel Townley and
                  Mohit Joshi and
                  Dmitry Ponomarev},
  title        = {{EA-PLRU:} Enclave-Aware Cache Replacement},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {5:1--5:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337172},
  doi          = {10.1145/3337167.3337172},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ShimizuTJP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/TMPD19,
  author       = {Santhosh Kumar T and
                  Debadatta Mishra and
                  Biswabandan Panda and
                  Nayan Deshmukh},
  title        = {CoWLight: Hardware Assisted Copy-on-Write Fault Handling for Secure
                  Deduplication},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {3:1--3:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337170},
  doi          = {10.1145/3337167.3337170},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/TMPD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/TorresYBBL19,
  author       = {Gildo Torres and
                  Zhiliu Yang and
                  Zander Blasingame and
                  James Bruska and
                  Chen Liu},
  title        = {Detecting Non-Control-Flow Hijacking Attacks Using Contextual Execution
                  Information},
  booktitle    = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167.3337168},
  doi          = {10.1145/3337167.3337168},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/TorresYBBL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2019hasp,
  title        = {Proceedings of the 8th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2019, June 23, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3337167},
  doi          = {10.1145/3337167},
  isbn         = {978-1-4503-7226-8},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/2019hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/DengXS18,
  author       = {Shuwen Deng and
                  Wenjie Xiong and
                  Jakub Szefer},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Cache timing side-channel vulnerability checking with computation
                  tree logic},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {2:1--2:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214294},
  doi          = {10.1145/3214292.3214294},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/DengXS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/DongSCCD18,
  author       = {Xiaowan Dong and
                  Zhuojia Shen and
                  John Criswell and
                  Alan L. Cox and
                  Sandhya Dwarkadas},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Spectres, virtual ghosts, and hardware support},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {5:1--5:9},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214297},
  doi          = {10.1145/3214292.3214297},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/DongSCCD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/KhanG18,
  author       = {Mohammad Nasim Imtiaz Khan and
                  Swaroop Ghosh},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Fault injection attacks on emerging non-volatile memory and countermeasures},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {10:1--10:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214302},
  doi          = {10.1145/3214292.3214302},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/KhanG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/Lowe-PowerAFKN18,
  author       = {Jason Lowe{-}Power and
                  Venkatesh Akella and
                  Matthew K. Farrens and
                  Samuel T. King and
                  Christopher J. Nitta},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {A case for exposing extra-architectural state in the {ISA:} position
                  paper},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {8:1--8:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214300},
  doi          = {10.1145/3214292.3214300},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/Lowe-PowerAFKN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/MofradZLS18,
  author       = {Saeid Mofrad and
                  Fengwei Zhang and
                  Shiyong Lu and
                  Weidong Shi},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {A comparison study of intel {SGX} and {AMD} memory encryption technology},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {9:1--9:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214301},
  doi          = {10.1145/3214292.3214301},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/MofradZLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/MushtaqABCLG18,
  author       = {Maria Mushtaq and
                  Ayaz Akram and
                  Muhammad Khurram Bhatti and
                  Maham Chaudhry and
                  Vianney Lapotre and
                  Guy Gogniat},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {NIGHTs-WATCH: a cache-based side-channel intrusion detector using
                  hardware performance counters},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214293},
  doi          = {10.1145/3214292.3214293},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/MushtaqABCLG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/PetersLVPK18,
  author       = {Travis Peters and
                  Reshma Lal and
                  Srikanth Varadarajan and
                  Pradeep Pappachan and
                  David Kotz},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {{BASTION-SGX:} bluetooth and architectural support for trusted {I/O}
                  on {SGX}},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {3:1--3:9},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214295},
  doi          = {10.1145/3214292.3214295},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/PetersLVPK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/VigLBM18,
  author       = {Saru Vig and
                  Siew{-}Kei Lam and
                  Sarani Bhattacharya and
                  Debdeep Mukhopadhyay},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Rapid detection of rowhammer attacks using dynamic skewed hash tree},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {7:1--7:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214299},
  doi          = {10.1145/3214292.3214299},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/VigLBM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/VuongSTB18,
  author       = {Andrew Vuong and
                  Ali Shafiee and
                  Meysam Taassori and
                  Rajeev Balasubramonian},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {An MLP-aware leakage-free memory controller},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {4:1--4:7},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214296},
  doi          = {10.1145/3214292.3214296},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/VuongSTB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/WongHC18,
  author       = {Ming Ming Wong and
                  Jawad Haj{-}Yahya and
                  Anupam Chattopadhyay},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {{SMARTS:} secure memory assurance of {RISC-V} trusted SoC},
  booktitle    = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  pages        = {6:1--6:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292.3214298},
  doi          = {10.1145/3214292.3214298},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/WongHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2018hasp,
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {Proceedings of the 7th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA,
                  USA, June 02-02, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3214292},
  doi          = {10.1145/3214292},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/2018hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/AriasSJ17,
  author       = {Orlando Arias and
                  Dean Sullivan and
                  Yier Jin},
  title        = {HA2lloc: Hardware-Assisted Secure Allocator},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {8:1--8:7},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092635},
  doi          = {10.1145/3092627.3092635},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/AriasSJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ChakrabartiLVMR17,
  author       = {Somnath Chakrabarti and
                  Rebekah Leslie{-}Hurd and
                  Mona Vij and
                  Frank McKeen and
                  Carlos V. Rozas and
                  Dror Caspi and
                  Ilya Alexandrovich and
                  Ittai Anati},
  title        = {Intel{\textregistered} Software Guard Extensions (Intel{\textregistered}
                  {SGX)} Architecture for Oversubscription of Secure Memory in a Virtualized
                  Environment},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {7:1--7:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092634},
  doi          = {10.1145/3092627.3092634},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/ChakrabartiLVMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/GhoshMZS17,
  author       = {Santosh Ghosh and
                  Rafael Misoczki and
                  Li Zhao and
                  Manoj R. Sastry},
  title        = {Lightweight Block Cipher Circuits for Automotive and IoT Sensor Devices},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {5:1--5:7},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092632},
  doi          = {10.1145/3092627.3092632},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/GhoshMZS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/MenonMRGV17,
  author       = {Arjun Menon and
                  Subadra Murugan and
                  Chester Rebeiro and
                  Neel Gala and
                  Kamakoti Veezhinathan},
  title        = {Shakti-T: {A} {RISC-V} Processor with Light Weight Security Extensions},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {2:1--2:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092629},
  doi          = {10.1145/3092627.3092629},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/MenonMRGV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/NingZSS17,
  author       = {Zhenyu Ning and
                  Fengwei Zhang and
                  Weisong Shi and
                  Weidong Shi},
  title        = {Position Paper: Challenges Towards Securing Hardware-assisted Execution
                  Environments},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {6:1--6:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092633},
  doi          = {10.1145/3092627.3092633},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/NingZSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ShwartzB17,
  author       = {Ofir Shwartz and
                  Yitzhak Birk},
  title        = {SeM: {A} {CPU} Architecture Extension for Secure Remote Computing},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092631},
  doi          = {10.1145/3092627.3092631},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/ShwartzB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/YuK17,
  author       = {Weize Yu and
                  Sel{\c{c}}uk K{\"{o}}se},
  title        = {A Lightweight {AES} Implementation Against Bivariate First-Order {DPA}
                  Attacks},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {1:1--1:7},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092628},
  doi          = {10.1145/3092627.3092628},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/YuK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ZhangL17,
  author       = {Tianwei Zhang and
                  Ruby B. Lee},
  title        = {Host-Based Dos Attacks and Defense in the Cloud},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {3:1--3:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092630},
  doi          = {10.1145/3092627.3092630},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ZhangL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2017hasp,
  title        = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627},
  doi          = {10.1145/3092627},
  isbn         = {978-1-4503-5266-6},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/2017hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/AzrielGGM16,
  author       = {Leonid Azriel and
                  Ran Ginosar and
                  Shay Gueron and
                  Avi Mendelson},
  title        = {Using Scan Side Channel for Detecting {IP} Theft},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948619},
  doi          = {10.1145/2948618.2948619},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/AzrielGGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/BhattacharyaRM16,
  author       = {Sarani Bhattacharya and
                  Chester Rebeiro and
                  Debdeep Mukhopadhyay},
  title        = {A Formal Security Analysis of Even-Odd Sequential Prefetching in Profiled
                  Cache-Timing Attacks},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {6:1--6:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948624},
  doi          = {10.1145/2948618.2948624},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/BhattacharyaRM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/CheriseyGRJ16,
  author       = {Eloi de Ch{\'{e}}risey and
                  Sylvain Guilley and
                  Olivier Rioul and
                  Darshana Jayasinghe},
  title        = {Template Attacks with Partial Profiles and Dirichlet Priors: Application
                  to Timing Attacks},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {7:1--7:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948625},
  doi          = {10.1145/2948618.2948625},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/CheriseyGRJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/LeeL16,
  author       = {Wei{-}Han Lee and
                  Ruby B. Lee},
  title        = {Implicit Sensor-based Authentication of Smartphone Users with Smartwatch},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {9:1--9:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948627},
  doi          = {10.1145/2948618.2948627},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/LeeL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/McKeenAACJLR16,
  author       = {Frank McKeen and
                  Ilya Alexandrovich and
                  Ittai Anati and
                  Dror Caspi and
                  Simon Johnson and
                  Rebekah Leslie{-}Hurd and
                  Carlos V. Rozas},
  title        = {Intel{\textregistered} Software Guard Extensions (Intel{\textregistered}
                  {SGX)} Support for Dynamic Memory Management Inside an Enclave},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {10:1--10:9},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2954331},
  doi          = {10.1145/2948618.2954331},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/McKeenAACJLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/MoonLHJSP16,
  author       = {Hyungon Moon and
                  Jinyong Lee and
                  Dongil Hwang and
                  Seonhwa Jung and
                  Jiwon Seo and
                  Yunheung Paek},
  title        = {Architectural Supports to Protect {OS} Kernels from Code-Injection
                  Attacks},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {5:1--5:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948623},
  doi          = {10.1145/2948618.2948623},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/MoonLHJSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/RawatS16,
  author       = {Hemendra K. Rawat and
                  Patrick Schaumont},
  title        = {{SIMD} Instruction Set Extensions for Keccak with Applications to
                  SHA-3, Keyak and Ketje},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948622},
  doi          = {10.1145/2948618.2948622},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/RawatS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/TorresL16,
  author       = {Gildo Torres and
                  Chen Liu},
  title        = {Can Data-Only Exploits be Detected at Runtime Using Hardware Events?:
                  {A} Case Study of the Heartbleed Vulnerability},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {2:1--2:7},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948620},
  doi          = {10.1145/2948618.2948620},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/TorresL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/XingSL16,
  author       = {Bin Cedric Xing and
                  Mark Shanahan and
                  Rebekah Leslie{-}Hurd},
  title        = {Intel{\textregistered} Software Guard Extensions (Intel{\textregistered}
                  {SGX)} Software Support for Dynamic Memory Allocation inside an Enclave},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {11:1--11:9},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2954330},
  doi          = {10.1145/2948618.2954330},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/XingSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/YuceGDPNS16,
  author       = {Bilgiday Yuce and
                  Nahid Farhady Ghalaty and
                  Chinmay Deshpande and
                  Conor Patrick and
                  Leyla Nazhandali and
                  Patrick Schaumont},
  title        = {{FAME:} Fault-attack Aware Microprocessor Extensions for Hardware
                  Fault Detection and Software Fault Response},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {8:1--8:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948626},
  doi          = {10.1145/2948618.2948626},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/YuceGDPNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ZhangZ16,
  author       = {Fengwei Zhang and
                  Hongwei Zhang},
  title        = {SoK: {A} Study of Using Hardware-assisted Isolated Execution Environments
                  for Security},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {3:1--3:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948621},
  doi          = {10.1145/2948618.2948621},
  timestamp    = {Thu, 25 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/ZhangZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2016hasp,
  title        = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618},
  doi          = {10.1145/2948618},
  isbn         = {978-1-4503-4769-3},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/2016hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/AhmadHHDK15,
  author       = {Masab Ahmad and
                  Syed Kamran Haider and
                  Farrukh Hijaz and
                  Marten van Dijk and
                  Omer Khan},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Exploring the performance implications of memory safety primitives
                  in many-core processors executing multi-threaded workloads},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {6:1--6:8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768572},
  doi          = {10.1145/2768566.2768572},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/AhmadHHDK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/DeTranoGGKK15,
  author       = {Alexander DeTrano and
                  Sylvain Guilley and
                  Xiaofei Guo and
                  Naghmeh Karimi and
                  Ramesh Karri},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Exploiting small leakages in masks to turn a second-order attack into
                  a first-order attack},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {7:1--7:5},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768573},
  doi          = {10.1145/2768566.2768573},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/DeTranoGGKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/El-HadedyS15,
  author       = {Mohamed El{-}Hadedy and
                  Kevin Skadron},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Hardware overhead analysis of programmability in {ARX} crypto processing},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {8:1--8:4},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768574},
  doi          = {10.1145/2768566.2768574},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/El-HadedyS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/EvtyushkinPG15,
  author       = {Dmitry Evtyushkin and
                  Dmitry V. Ponomarev and
                  Nael B. Abu{-}Ghazaleh},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Covert channels through branch predictors: a feasibility study},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {5:1--5:8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768571},
  doi          = {10.1145/2768566.2768571},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/EvtyushkinPG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/JapSB15,
  author       = {Dirmanto Jap and
                  Marc St{\"{o}}ttinger and
                  Shivam Bhasin},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Support vector regression: exploiting machine learning techniques
                  for leakage modeling},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {2:1--2:8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768568},
  doi          = {10.1145/2768566.2768568},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/JapSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/LeeHHKP15,
  author       = {Yongje Lee and
                  Ingoo Heo and
                  Dongil Hwang and
                  Kyungmin Kim and
                  Yunheung Paek},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Towards a practical solution to detect code reuse attacks on {ARM}
                  mobile devices},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {3:1--3:8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768569},
  doi          = {10.1145/2768566.2768569},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/LeeHHKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/LiuWL15,
  author       = {Fangfei Liu and
                  Hao Wu and
                  Ruby B. Lee},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Can randomized mapping secure instruction caches from side-channel
                  attacks?},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768570},
  doi          = {10.1145/2768566.2768570},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/LiuWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/LuoFFDKL15,
  author       = {Pei Luo and
                  Yunsi Fei and
                  Xin Fang and
                  A. Adam Ding and
                  David R. Kaeli and
                  Miriam Leeser},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Side-channel analysis of MAC-Keccak hardware implementations},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768567},
  doi          = {10.1145/2768566.2768567},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/LuoFFDKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/NomaniS15,
  author       = {Junaid Nomani and
                  Jakub Szefer},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Predicting program phases and defending against side-channel attacks
                  using hardware performance counters},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {9:1--9:4},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768575},
  doi          = {10.1145/2768566.2768575},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/NomaniS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/OuaarabDP15,
  author       = {Salaheddine Ouaarab and
                  Guillaume Duc and
                  Renaud Pacalet},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Performance optimizations of integrity checking based on Merkle trees},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {10:1--10:4},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768576},
  doi          = {10.1145/2768566.2768576},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/OuaarabDP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2015hasp,
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566},
  doi          = {10.1145/2768566},
  isbn         = {978-1-4503-3483-9},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/2015hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/0020V14,
  author       = {Jie Chen and
                  Guru Venkataramani},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {An algorithm for detecting contention-based covert timing channels
                  on shared hardware},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611766},
  doi          = {10.1145/2611765.2611766},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/0020V14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/BhasinDGN14,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side-channel leakage and trace compression using normalized inter-class
                  variance},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {7:1--7:9},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611772},
  doi          = {10.1145/2611765.2611772},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/BhasinDGN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ChoutaGDBBBFC14,
  author       = {Taoufik Chouta and
                  Tarik Graba and
                  Jean{-}Luc Danger and
                  Julien Bringer and
                  Ma{\"{e}}l Berthier and
                  Yves Bocktaels and
                  M{\'{e}}lanie Favre and
                  Herv{\'{e}} Chabanne},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side channel analysis on an embedded hardware fingerprint biometric
                  comparator {\&} low cost countermeasures},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {6:1--6:6},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611771},
  doi          = {10.1145/2611765.2611771},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ChoutaGDBBBFC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/DhawanVRCSKPD14,
  author       = {Udit Dhawan and
                  Nikos Vasilakis and
                  Raphael Rubin and
                  Silviu Chiricescu and
                  Jonathan M. Smith and
                  Thomas F. Knight Jr. and
                  Benjamin C. Pierce and
                  Andr{\'{e}} DeHon},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {{PUMP:} a programmable unit for metadata processing},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {8:1--8:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611773},
  doi          = {10.1145/2611765.2611773},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/DhawanVRCSKPD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/FerrettiMM14,
  author       = {Claudio Ferretti and
                  Silvia Mella and
                  Filippo Melzani},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {The role of the fault model in {DFA} against {AES}},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611769},
  doi          = {10.1145/2611765.2611769},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/FerrettiMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/GunduSSPJBT14,
  author       = {Akhila Gundu and
                  Gita Sreekumar and
                  Ali Shafiee and
                  Seth H. Pugsley and
                  Hardik B. Jain and
                  Rajeev Balasubramonian and
                  Mohit Tiwari},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Memory bandwidth reservation in the cloud to avoid information leakage
                  in the memory controller},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {11:1--11:5},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611776},
  doi          = {10.1145/2611765.2611776},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/GunduSSPJBT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/KazdagliHRT14,
  author       = {Mikhail Kazdagli and
                  Ling Huang and
                  Vijay Janapa Reddi and
                  Mohit Tiwari},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Morpheus: benchmarking computational diversity in mobile malware},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {3:1--3:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611767},
  doi          = {10.1145/2611765.2611767},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/KazdagliHRT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/SwamySLFK14,
  author       = {Tushar Swamy and
                  Neel Shah and
                  Pei Luo and
                  Yunsi Fei and
                  David R. Kaeli},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Scalable and efficient implementation of correlation power analysis
                  using graphics processing units (GPUs)},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {10:1--10:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611775},
  doi          = {10.1145/2611765.2611775},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/SwamySLFK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/SzeferB14,
  author       = {Jakub Szefer and
                  Sebastian Biedermann},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Towards fast hardware memory integrity checking with skewed Merkle
                  trees},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {9:1--9:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611774},
  doi          = {10.1145/2611765.2611774},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/SzeferB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/XuSD14,
  author       = {Lei Xu and
                  Weidong Shi and
                  Nicholas DeSalvo},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Seasoning effect based side channel attacks to {AES} implementation
                  with phase change memory},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {5:1--5:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611770},
  doi          = {10.1145/2611765.2611770},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/XuSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/YueRWC14,
  author       = {Mengchao Yue and
                  William H. Robinson and
                  Lanier A. Watkins and
                  Cherita L. Corbett},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Constructing timing-based covert channels in mobile networks by adjusting
                  {CPU} frequency},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {2:1--2:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611768},
  doi          = {10.1145/2611765.2611768},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/YueRWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2014hasp,
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765},
  doi          = {10.1145/2611765},
  isbn         = {978-1-4503-2777-0},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/2014hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/BhattacharyaRM13,
  author       = {Sarani Bhattacharya and
                  Chester Rebeiro and
                  Debdeep Mukhopadhyay},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Unraveling timewarp: what all the fuzz is about?},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {8},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487734},
  doi          = {10.1145/2487726.2487734},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/BhattacharyaRM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/CarletG13,
  author       = {Claude Carlet and
                  Sylvain Guilley},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side-channel indistinguishability},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {9},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487735},
  doi          = {10.1145/2487726.2487735},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/CarletG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/CherifDLMB13,
  author       = {Zouha Cherif and
                  Jean{-}Luc Danger and
                  Florent Lozach and
                  Yves Mathieu and
                  Lilian Bossuet},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Evaluation of delay PUFs on {CMOS} 65 nm technology: {ASIC} vs {FPGA}},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {4},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487730},
  doi          = {10.1145/2487726.2487730},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/CherifDLMB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/GeWLK13,
  author       = {Shizun Ge and
                  Zhen Wang and
                  Pei Luo and
                  Mark G. Karpovsky},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Secure memories resistant to both random errors and fault injection
                  attacks using nonlinear error correction codes},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487731},
  doi          = {10.1145/2487726.2487731},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/GeWLK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/HoekstraLPPC13,
  author       = {Matthew Hoekstra and
                  Reshma Lal and
                  Pradeep Pappachan and
                  Vinay Phegade and
                  Juan del Cuvillo},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Using innovative instructions to create trustworthy software solutions},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {11},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2488370},
  doi          = {10.1145/2487726.2488370},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/HoekstraLPPC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/LiuL13,
  author       = {Fangfei Liu and
                  Ruby B. Lee},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Security testing of a secure cache design},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487729},
  doi          = {10.1145/2487726.2487729},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/LiuL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/McKeenABRSSS13,
  author       = {Frank McKeen and
                  Ilya Alexandrovich and
                  Alex Berenzon and
                  Carlos V. Rozas and
                  Hisham Shafi and
                  Vedvyas Shanbhogue and
                  Uday R. Savagaonkar},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Innovative instructions and software model for isolated execution},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {10},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2488368},
  doi          = {10.1145/2487726.2488368},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/McKeenABRSSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/MuehlberghuberGKDH13,
  author       = {Michael Muehlberghuber and
                  Frank K. G{\"{u}}rkaynak and
                  Thomas Korak and
                  Philipp Dunst and
                  Michael Hutter},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Red team vs. blue team hardware trojan analysis: detection of a hardware
                  trojan on an actual {ASIC}},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487727},
  doi          = {10.1145/2487726.2487727},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/MuehlberghuberGKDH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/OrenWW13,
  author       = {Yossef Oren and
                  Ofir Weisse and
                  Avishai Wool},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Practical template-algebraic side channel attacks with extremely low
                  data complexity},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {7},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487733},
  doi          = {10.1145/2487726.2487733},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/OrenWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/SantosF13,
  author       = {Juan Carlos Mart{\'{\i}}nez Santos and
                  Yunsi Fei},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Micro-architectural support for metadata coherence in multi-core dynamic
                  information flow tracking},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487732},
  doi          = {10.1145/2487726.2487732},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/SantosF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ZhangLCL13,
  author       = {Tianwei Zhang and
                  Fangfei Liu and
                  Si Chen and
                  Ruby B. Lee},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side channel vulnerability metrics: the promise and the pitfalls},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487728},
  doi          = {10.1145/2487726.2487728},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ZhangLCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2013hasp,
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726},
  doi          = {10.1145/2487726},
  isbn         = {978-1-4503-2118-1},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/2013hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}