skip to main content
10.1145/3505253acmotherconferencesBook PagePublication PageshaspConference Proceedingsconference-collections
HASP '21: Proceedings of the 10th International Workshop on Hardware and Architectural Support for Security and Privacy
ACM2021 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy Virtual CT USA 18 October 2021
ISBN:
978-1-4503-9614-1
Published:
04 June 2022

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
research-article
Open Access
SPARSE: Spatially Aware LFI Resilient State Machine Encoding

As finite state machines (FSMs) control the behavior of sequential circuits, they can be a target for attacks. With laser-based fault injection (LFI), an adversary may attain unauthorized access to sensitive states by altering the values of individual ...

research-article
Practical and Scalable Security Verification of Secure Architectures

We present a new and practical framework for security verification of secure architectures. Specifically, we break the verification task into external verification and internal verification. External verification considers the external protocols, i.e. ...

research-article
Open Access
A Novel Memory Management for RISC-V Enclaves

Trusted Execution Environment (TEE) is a popular technology to protect sensitive data and programs. Recent TEEs have proposed the concept of enclaves to execute code processing sensitive data, which cannot be tampered with even by a malicious OS. ...

research-article
Public Access
Towards Trusted IoT Sensing Systems: Implementing PUF as Secure Key Generator for Root of Trust and Message Authentication Code

Trustworthy sensor data is important for IoT sensing systems. As such, these systems need to guarantee that the sensor data is acquired by the correct device and has not been tampered with. However, IoT sensing systems can be quite complex and are ...

research-article
Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research

Modern computer systems tend to rely on large trusted computing bases (TCBs) for operations. To address the TCB bloating problem, hardware vendors have developed mechanisms to enable or facilitate the creation of a trusted execution environment (TEE) in ...

research-article
Public Access
Short Paper: A Quantum Circuit Obfuscation Methodology for Security and Privacy

In the Noisy Intermediate-Scale Quantum (NISQ) realm, efficient quantum circuit compilation is critical to ensure successful computation. Several third-party compilers are improving the compilation times and depth/gate counts. Untrusted third parties ...

research-article
Public Access
Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers

Fingerprinting of quantum computer devices is a new threat that poses a challenge to shared, cloud-based quantum computers. Fingerprinting can allow adversaries to map quantum computer infrastructures, uniquely identify cloud-based devices which ...

research-article
Public Access
InTrust-IoT: Intelligent Ecosystem based on Power Profiling of Trusted device(s) in IoT for Hardware Trojan Detection

Modern Resource-Constrained (RC) Internet of Things (IoT) devices are subject to several types of attacks, including hardware-level attacks. Most of the existing state-of-the-art solutions are invasive, require expensive design time interventions, or ...

Index Terms

  1. Proceedings of the 10th International Workshop on Hardware and Architectural Support for Security and Privacy
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Acceptance Rates

      Overall Acceptance Rate9of13submissions,69%
      YearSubmittedAcceptedRate
      HASP '1313969%
      Overall13969%