No abstract available.
Proceeding Downloads
ALARM: Active LeArning of Rowhammer Mitigations
Rowhammer is a serious security problem of contemporary dynamic random-access memory (DRAM) where reads or writes of bits can flip other bits. DRAM manufacturers add mitigations, but don’t disclose details, making it difficult for customers to evaluate ...
Side-Channel Analysis and Countermeasure Design for Implementation of Curve448 on Cortex-M4
The highly secure Curve448 cryptographic algorithm has been recently recommended by NIST. While this algorithm provides 224-bit security over elliptic curve cryptography, its implementation may still be vulnerable to physical side-channel attacks. In ...
SFP: Providing System Call Flow Protection against Software and Fault Attacks
With the improvements in computing technologies, edge devices in the Internet-of-Things or the automotive area have become more complex. The enabler technology for these complex systems are powerful application core processors with operating system ...
Clueless: A Tool Characterising Values Leaking as Addresses
Clueless is a binary instrumentation tool that characterises explicit cache side channel vulnerabilities of programs. It detects the transformation of data values into addresses by tracking dynamic instruction dependencies. Clueless tags data values in ...
SoK: How Not to Architect Your Next-Generation TEE Malware?
Besides Intel’s SGX technology, there are long-running discussions on how trusted computing technologies can be used to cloak malware. Past research showed example methods of malicious activities utilising Flicker, Trusted Platform Module, and recently ...
Robust and Secure Hybrid Quantum-Classical Computation on Untrusted Cloud-Based Quantum Hardware
Quantum computers are currently accessible through a cloud-based platform that allows users to run their programs on a suite of quantum hardware. As the quantum computing ecosystem grows in popularity and utility, it is reasonable to expect more ...
Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks
Spectre intrusions exploit speculative execution design vulnerabilities in modern processors. The attacks violate the principles of isolation in programs to gain unauthorized private user information. Current state-of-the-art detection techniques ...
Index Terms
- Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
HASP '13 | 13 | 9 | 69% |
Overall | 13 | 9 | 69% |