skip to main content
10.1145/3569562acmotherconferencesBook PagePublication PageshaspConference Proceedingsconference-collections
HASP '22: Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
HASP '22: Hardware and Architectural Support for Security and Privacy Chicago IL USA 1 October 2022
ISBN:
978-1-4503-9871-8
Published:
21 September 2023

Bibliometrics
Abstract

No abstract available.

Proceeding Downloads

Skip Table Of Content Section
research-article
ALARM: Active LeArning of Rowhammer Mitigations

Rowhammer is a serious security problem of contemporary dynamic random-access memory (DRAM) where reads or writes of bits can flip other bits. DRAM manufacturers add mitigations, but don’t disclose details, making it difficult for customers to evaluate ...

research-article
Free
Side-Channel Analysis and Countermeasure Design for Implementation of Curve448 on Cortex-M4

The highly secure Curve448 cryptographic algorithm has been recently recommended by NIST. While this algorithm provides 224-bit security over elliptic curve cryptography, its implementation may still be vulnerable to physical side-channel attacks. In ...

research-article
Open Access
SFP: Providing System Call Flow Protection against Software and Fault Attacks

With the improvements in computing technologies, edge devices in the Internet-of-Things or the automotive area have become more complex. The enabler technology for these complex systems are powerful application core processors with operating system ...

research-article
Open Access
Clueless: A Tool Characterising Values Leaking as Addresses

Clueless is a binary instrumentation tool that characterises explicit cache side channel vulnerabilities of programs. It detects the transformation of data values into addresses by tracking dynamic instruction dependencies. Clueless tags data values in ...

research-article
SoK: How Not to Architect Your Next-Generation TEE Malware?

Besides Intel’s SGX technology, there are long-running discussions on how trusted computing technologies can be used to cloak malware. Past research showed example methods of malicious activities utilising Flicker, Trusted Platform Module, and recently ...

research-article
Free
Robust and Secure Hybrid Quantum-Classical Computation on Untrusted Cloud-Based Quantum Hardware

Quantum computers are currently accessible through a cloud-based platform that allows users to run their programs on a suite of quantum hardware. As the quantum computing ecosystem grows in popularity and utility, it is reasonable to expect more ...

short-paper
Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks

Spectre intrusions exploit speculative execution design vulnerabilities in modern processors. The attacks violate the principles of isolation in programs to gain unauthorized private user information. Current state-of-the-art detection techniques ...

Index Terms

  1. Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Acceptance Rates

      Overall Acceptance Rate9of13submissions,69%
      YearSubmittedAcceptedRate
      HASP '1313969%
      Overall13969%