No abstract available.
SPARSE: Spatially Aware LFI Resilient State Machine Encoding
As finite state machines (FSMs) control the behavior of sequential circuits, they can be a target for attacks. With laser-based fault injection (LFI), an adversary may attain unauthorized access to sensitive states by altering the values of individual ...
Practical and Scalable Security Verification of Secure Architectures
We present a new and practical framework for security verification of secure architectures. Specifically, we break the verification task into external verification and internal verification. External verification considers the external protocols, i.e. ...
A Novel Memory Management for RISC-V Enclaves
Trusted Execution Environment (TEE) is a popular technology to protect sensitive data and programs. Recent TEEs have proposed the concept of enclaves to execute code processing sensitive data, which cannot be tampered with even by a malicious OS. ...
Towards Trusted IoT Sensing Systems: Implementing PUF as Secure Key Generator for Root of Trust and Message Authentication Code
Trustworthy sensor data is important for IoT sensing systems. As such, these systems need to guarantee that the sensor data is acquired by the correct device and has not been tampered with. However, IoT sensing systems can be quite complex and are ...
Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research
Modern computer systems tend to rely on large trusted computing bases (TCBs) for operations. To address the TCB bloating problem, hardware vendors have developed mechanisms to enable or facilitate the creation of a trusted execution environment (TEE) in ...
Short Paper: A Quantum Circuit Obfuscation Methodology for Security and Privacy
In the Noisy Intermediate-Scale Quantum (NISQ) realm, efficient quantum circuit compilation is critical to ensure successful computation. Several third-party compilers are improving the compilation times and depth/gate counts. Untrusted third parties ...
Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers
Fingerprinting of quantum computer devices is a new threat that poses a challenge to shared, cloud-based quantum computers. Fingerprinting can allow adversaries to map quantum computer infrastructures, uniquely identify cloud-based devices which ...
InTrust-IoT: Intelligent Ecosystem based on Power Profiling of Trusted device(s) in IoT for Hardware Trojan Detection
Modern Resource-Constrained (RC) Internet of Things (IoT) devices are subject to several types of attacks, including hardware-level attacks. Most of the existing state-of-the-art solutions are invasive, require expensive design time interventions, or ...
Index Terms
- Proceedings of the 10th International Workshop on Hardware and Architectural Support for Security and Privacy
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
HASP '13 | 13 | 9 | 69% |
Overall | 13 | 9 | 69% |