With recent, publicized security flaws in major computer processors, security and privacy research focusing on hardware and architecture has gained even more interest in the past year. In the era of cloud computing, smartphones and Internet of Things (IoT), industry and academia have to address the ever increasing challenges and requirements in order to meet the evolving landscape of security threats.
Over the years, the goal of HASP has been to bring together researchers, developers, and practitioners from academia and industry, to share new research results, practical insights, experiences and implementations related to all aspects of hardware and architectural support for security and privacy, and to discuss future trends in research and applications. We encourage contributions describing innovative work on hardware and architectural support for Internet of Things (IoT), smartphones and other smart devices, sensors and sensor networks, cloud computing and data centers which form the backbone of much of computing today.
Proceeding Downloads
NIGHTs-WATCH: a cache-based side-channel intrusion detector using hardware performance counters
This paper presents a novel run-time detection mechanism, called NIGHTs-WATCH, for access-driven cache-based Side-Channel Attacks (SCAs). It comprises of multiple machine learning models, which use real-time data from hardware performance counters for ...
Cache timing side-channel vulnerability checking with computation tree logic
Caches are one of the key features of modern processors as they help to improve memory access timing through caching recently used data. However, due to the timing differences between cache hits and misses, numerous timing side-channels have been ...
BASTION-SGX: Bluetooth and Architectural Support for Trusted I/O on SGX
This paper presents work towards realizing architectural support for Bluetooth Trusted I/O on SGX-enabled platforms, with the goal of providing I/O data protection that does not rely on system software security. Indeed, we are primarily concerned with ...
An MLP-aware leakage-free memory controller
Timing channels can be exploited to leak information between two virtual machines running on a shared server. Indeed, cache timing channels are important components in the Spectre attack. A shared memory controller can also be leveraged to establish a ...
Spectres, virtual ghosts, and hardware support
Side-channel attacks, such as Spectre and Meltdown, that leverage speculative execution pose a serious threat to computing systems. Worse yet, such attacks can be perpetrated by compromised operating system (OS) kernels to bypass defenses that protect ...
SMARTS: secure memory assurance of RISC-V trusted SoC
Security is evolving fast as the prime design concern for modern System-on-Chip (SoC), especially for lightweight design choices. In this manuscript, we study the design of memory protection unit (MPU) that will be integrated in RISC-V trusted SoC, with ...
Rapid detection of rowhammer attacks using dynamic skewed hash tree
RowHammer attacks pose a security threat to DRAM chips by causing bit-flips in sensitive memory regions. We propose a technique that combines a sliding window protocol and a dynamic integrity tree to rapidly detect multiple bit-flips caused by RowHammer ...
Position Paper: A case for exposing extra-architectural state in the ISA
The recent Meltdown and Spectre attacks took the community by surprise. Rather than exploiting an incorrect implementation of the ISA, these attacks leverage the undocumented implementation-specific speculation behavior of high-performance ...
A comparison study of intel SGX and AMD memory encryption technology
Hardware-assisted trusted execution environments are secure isolation technologies that have been engineered to serve as efficient defense mechanisms to provide a security boundary at the system level. Hardware vendors have introduced a variety of ...
Fault injection attacks on emerging non-volatile memory and countermeasures
Emerging Non-Volatile Memories (NVMs) suffer from high and asymmetric read/write current and long write latency which can result in supply noise such as supply voltage droop and ground bounce. The magnitude of supply noise depends on the old data and ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
HASP '13 | 13 | 9 | 69% |
Overall | 13 | 9 | 69% |