skip to main content
10.1145/3623652acmotherconferencesBook PagePublication PageshaspConference Proceedingsconference-collections
HASP '23: Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy
ACM2023 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
HASP '23: Hardware and Architectural Support for Security and Privacy 2023 Toronto Canada 29 October 2023
ISBN:
979-8-4007-1623-2
Published:
29 October 2023

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
research-article
Open Access
SEIF: Augmented Symbolic Execution for Information Flow in Hardware Designs

We present SEIF, an exploratory methodology for information flow verification based on symbolic execution. SEIF begins with a statically built overapproximation of the information flow through a design and uses guided symbolic execution to provide a ...

research-article
Open Access
EntryBleed: A Universal KASLR Bypass against KPTI on Linux

For years, attackers have compromised systems by developing exploits that rely on known locations of kernel code and data segments. KASLR (Kernel Address Space Layout Randomization) is a key mitigation in modern operating systems which hampers these ...

research-article
Open Access
Triton: Software-Defined Threat Model for Secure Multi-Tenant ML Inference Accelerators

Secure machine-learning inference is essential with the advent of multi-tenancy in machine learning-as-a-service (MLaaS) accelerators. Model owners demand the confidentiality of both model weights and architecture, while end users want to protect their ...

research-article
Open Access
Automated Security Analysis for Real-World IoT Devices

Automatic security protocol analysis is a fruitful research topic that demonstrates the application of formal methods to security analysis. Several endeavors in the last decades successfully verified security properties of large-scale network protocols ...

research-article
DINAR: Enabling Distribution Agnostic Noise Injection in Machine Learning Hardware

Machine learning (ML) has seen a major rise in popularity on edge devices in recent years, ranging from IoT devices to self-driving cars. Security in a critical consideration on these platforms. State-of-the-art security-centric ML algorithms (e.g., ...

research-article
DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans

The global semiconductor supply chain involves design and fabrication at various locations, which leads to multiple security vulnerabilities, e.g., Hardware Trojan (HT) insertion. Although most HTs target digital circuits, HTs can be inserted in analog ...

research-article
Data Processing Unit's Entry into Confidential Computing

One of the biggest transformations in the datacenter in the past decade has been the rapid growth of heterogenous computing involving HW accelerators to allow application specific offloads for power and performance efficiencies. There is a major shift ...

research-article
Open Access
SoK: Fault Injection Attacks on Cryptosystems

Fault injection attacks are a powerful technique that intentionally induces faults during cryptographic computations to leak secret information. This paper provides a survey of fault attack techniques on different cryptosystems. The fault attack ...

research-article
Open Access
Towards a Formally Verified Security Monitor for VM-based Confidential Computing

Confidential computing is a key technology for isolating high-assurance applications from the large amounts of untrusted code typical in modern systems. Existing confidential computing systems cannot be certified for use in critical applications, like ...

research-article
SoK: A First Order Survey of Quantum Supply Dynamics and Threat Landscapes

Quantum computing, with its transformative computational potential, is gaining prominence in the technological landscape. As a new and exotic technology, quantum computers involve innumerable Intellectual Property (IP) in the form of fabrication recipe, ...

research-article
A gem5 based Platform for Micro-Architectural Security Analysis

In this article we present a simulation platform based on gem5 for security analysis. On top of gem5’s architectural exploration and performance estimation capability, our platform permits attacks on ARM Trustzone, security evaluation of cypto libraries,...

Index Terms

  1. Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Acceptance Rates

    Overall Acceptance Rate9of13submissions,69%
    YearSubmittedAcceptedRate
    HASP '1313969%
    Overall13969%