Abstract is missing.
- Safeguarding the Intelligence of Neural Networks with Built-in Light-weight Integrity MArks (LIMA)Fateme S. Hosseini, Qi Liu, Fanruo Meng, Chengmo Yang, Wujie Wen. 1-12 [doi]
- HW2VEC: a Graph Learning Tool for Automating Hardware SecurityShih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, Mohammad Abdullah Al Faruque. 13-23 [doi]
- Automated Detection of Spectre and Meltdown Attacks Using Explainable Machine LearningZhixin Pan, Prabhat Mishra 0001. 24-34 [doi]
- Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUMEmre Karabulut, Erdem Alkim, Aydin Aysu. 35-45 [doi]
- FaultLine: Software-Based Fault Injection on Memory TransfersJoseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet-Moundi. 46-55 [doi]
- SecWalk: Protecting Page Table Walks Against Fault AttacksRobert Schilling, Pascal Nasahl, Stefan Weiglhofer, Stefan Mangard. 56-67 [doi]
- Protecting Indirect Branches Against Fault Attacks Using ARM Pointer AuthenticationPascal Nasahl, Robert Schilling, Stefan Mangard. 68-79 [doi]
- iTimed: Cache Attacks on the Apple A10 Fusion SoCGregor Haas, Seetal Potluri, Aydin Aysu. 80-90 [doi]
- Cross-VM Information Leaks in FPGA-Accelerated Cloud EnvironmentsIlias Giechaskiel, Shanquan Tian, Jakub Szefer. 91-101 [doi]
- Time Series-Based Malware Detection Using Hardware Performance CountersAbraham Peedikayil Kuruvila, Sayar Karmakar, Kanad Basu. 102-112 [doi]
- A Comparison of Neural Networks for PCB Component SegmentationAbinai Pasunuri, Nathan Jessurun, Olivia P. Paradis, Navid Asadizanjani. 113-123 [doi]
- POCA: First Power-on Chip Authentication in Untrusted Foundry and AssemblyMd Sami Ul Islam Sami, Fahim Rahman, Adam Cron, Dale R. Donchin, Mike Borza, Farimah Farahmandi, Mark M. Tehranipoor. 124-135 [doi]
- 3D Unclonable Optical Identity for Universal Product VerificationChenxing Wang, Lily Raymond, Yifei Jin, Alireza Tavakkoli, Haoting Shen. 136-146 [doi]
- SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure ComputationArpita Patra, Thomas Schneider 0003, Ajith Suresh, Hossein Yalame. 147-157 [doi]
- Using Undervolting as an on-Device Defense Against Adversarial Machine Learning AttacksSaikat Majumdar, Mohammad Hossein Samavatian, Kristin Barber, Radu Teodorescu. 158-169 [doi]
- Lightweight Encryption Using Chaffing and Winnowing with All-or-Nothing Transform for Network-on-Chip ArchitecturesHansika Weerasena, Subodha Charles, Prabhat Mishra 0001. 170-180 [doi]
- Contrastive Graph Convolutional Networks for Hardware Trojan Detection in Third Party IP CoresNikhil Muralidhar, Abdullah Zubair, Nathanael R. Weidler, Ryan M. Gerdes, Naren Ramakrishnan. 181-191 [doi]
- ConNOC: A Practical Timing Channel Attack on Network-on-chip Hardware in a Multicore ProcessorUsman Ali, Omer Khan. 192-202 [doi]
- HERMES: Hardware-Efficient Speculative Dataflow Architecture for Bonsai Merkle Tree-Based Memory AuthenticationYu Zou, Amro Awad, Mingjie Lin. 203-213 [doi]
- RUDBA: Reusable User-Device Biometric Authentication Scheme for Multi-service SystemsZhonghao Liao, Yong Guan. 214-225 [doi]
- Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and HardwareAustin Harris 0001, Tarunesh Verma, Shijia Wei, Lauren Biernacki, Alex Kisil, Misiker Tadesse Aga, Valeria Bertacco, Baris Kasikci, Mohit Tiwari, Todd M. Austin. 226-238 [doi]
- TRRScope: Understanding Target Row Refresh Mechanism for Modern DDR ProtectionYichen Jiang, Huifeng Zhu, Haoqi Shan, Xiaolong Guo, Xuan Zhang 0001, Yier Jin. 239-247 [doi]
- NeurObfuscator: A Full-stack Obfuscation Tool to Mitigate Neural Architecture StealingJingtao Li, Zhezhi He, Adnan Siraj Rakin, Deliang Fan, Chaitali Chakrabarti. 248-258 [doi]
- Methodology of Assessing Information Leakage through Software-Accessible TelemetriesChen Liu, Monodeep Kar, Xueyang Wang, Nikhil Chawla, Neer Roggel, Bilgiday Yuce, Jason M. Fung. 259-269 [doi]
- Multiphysics Simulation of EM Side-Channels from Silicon Backside with ML-based Auto-POI IdentificationLang Lin, Deqi Zhu, Jimin Wen, Hua Chen, Yu Lu, Norman Chang, Calvin Chow, Harsh Shrivastav, Chia-Wei Chen, Kazuki Monta, Makoto Nagata. 270-280 [doi]
- Fun-SAT: Functional Corruptibility-Guided SAT-Based Attack on Sequential Logic EncryptionYinghua Hu, Yuke Zhang, Kaixin Yang, Dake Chen, Peter A. Beerel, Pierluigi Nuzzo. 281-291 [doi]
- JANUS: Boosting Logic Obfuscation Scope Through Reconfigurable FSM SynthesisLeon Li, Shuyi Ni, Alex Orailoglu. 292-303 [doi]
- Formal Evaluation and Construction of Glitch-resistant Masked FunctionsSofiane Takarabt, Sylvain Guilley, Youssef Souissi, Khaled Karray, Laurent Sauvage, Yves Mathieu. 304-313 [doi]