Login / Signup
ASHES@CCS
2017
2020
2023
2017
2023
Keyphrases
Publications
2023
Shungo Hayashi
,
Junichi Sakamoto
,
Masaki Chikano
,
Tsutomu Matsumoto
Effective Layout Design for Laser Fault Sensor on FPGA.
ASHES@CCS
(2023)
Xhani Marvin Saß
,
Thilo Krachenfels
,
Frederik Dermot Pustelnik
,
Jean-Pierre Seifert
,
Frank Altmann
Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis.
ASHES@CCS
(2023)
Ravikanth Pappu
Physical Unclonable Functions: The First Fifty Years.
ASHES@CCS
(2023)
Shoei Nashimoto
,
Tomoyuki Nagatsuka
Cover Chirp Jaming: Hybrid Jamming-Deception Attack on FMCW Radar and Its Countermeasure.
ASHES@CCS
(2023)
Owen Pemberton
,
David F. Oswald
BioLeak: Exploiting Cache Timing to Recover Fingerprint Minutiae Coordinates.
ASHES@CCS
(2023)
Tobias Stelzer
,
Felix Oberhansl
,
Jonas Schupp
,
Patrick Karl
Enabling Lattice-Based Post-Quantum Cryptography on the OpenTitan Platform.
ASHES@CCS
(2023)
Madhav Nair
,
Rajat Sadhukhan
,
Hammond Pearce
,
Debdeep Mukhopadhyay
,
Ramesh Karri
Netlist Whisperer: AI and NLP Fight Circuit Leakage!
ASHES@CCS
(2023)
Nils Rothaug
,
Simon Klix
,
Nicole Auth
,
Sinan Böcker
,
Endres Puschner
,
Steffen Becker
,
Christof Paar
Towards Unsupervised SEM Image Segmentation for IC Layout Extraction.
ASHES@CCS
(2023)
Eduardo Ferrufino
,
Luke Beckwith
,
Abubakr Abdulgadir
,
Jens-Peter Kaps
FOBOS 3: An Open-Source Platform for Side-Channel Analysis and Benchmarking.
ASHES@CCS
(2023)
Alok K. Singh
,
Ryan M. Gerdes
Better Side-Channel Attacks Through Measurements.
ASHES@CCS
(2023)
Claire Vishik
In Search of Trust: 30 Years of Evolution of Trusted Computing and Hardware Security.
ASHES@CCS
(2023)
Yanning Ji
,
Elena Dubrova
A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-Kyber.
ASHES@CCS
(2023)
Hikaru Nishiyama
,
Daisuke Fujimoto
,
Yu-ichi Hayashi
Remote Fault Injection Attack against Cryptographic Modules via Intentional Electromagnetic Interference from an Antenna.
ASHES@CCS
(2023)
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, ASHES 2023, Copenhagen, Denmark, 30 November 2023
ASHES@CCS
(2023)
Trevor Yap
,
Stjepan Picek
,
Shivam Bhasin
Beyond the Last Layer: Deep Feature Loss Functions in Side-channel Analysis.
ASHES@CCS
(2023)
2022
Yuval Yarom
Automating Cryptographic Code Generation.
ASHES@CCS
(2022)
Jens Trautmann
,
Nikolaos Patsiatzis
,
Andreas Becher
,
Stefan Wildermann
,
Jürgen Teich
Putting IMT to the Test: Revisiting and Expanding Interval Matching Techniques and their Calibration for SCA.
ASHES@CCS
(2022)
Muayad J. Aljafar
,
Florence Azaïs
,
Marie-Lise Flottes
,
Samuel Pagliarini
Leveraging Layout-based Effects for Locking Analog ICs.
ASHES@CCS
(2022)
Milad Seddigh
,
Mahdi Esfahani
,
Sarani Bhattacharya
,
Mohammad Reza Aref
,
Hadi Soleimany
Breaking KASLR on Mobile Devices without Any Use of Cache Memory.
ASHES@CCS
(2022)
Furkan Aydin
,
Aydin Aysu
Exposing Side-Channel Leakage of SEAL Homomorphic Encryption Library.
ASHES@CCS
(2022)
Raphael Viera
,
Jean-Max Dutertre
,
Rodrigo Silva Lima
Injecting Permanent Faults into the Flash Memory of a Microcontroller with Laser Illumination During Read Operations.
ASHES@CCS
(2022)
Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, ASHES 2022, Los Angeles, CA, USA, 11 November 2022
ASHES@CCS
(2022)
Lars Tebelmann
,
Moritz Wettermann
,
Michael Pehl
On-Chip Side-Channel Analysis of the Loop PUF.
ASHES@CCS
(2022)
Marten van Dijk
Towards Remote Verifiable Computation without Digital Secrets.
ASHES@CCS
(2022)
Marziyeh Rezaei
,
Liban Hussein
,
Sajjad Moazeni
Secure FMCW LiDAR Systems with Frequency Encryption.
ASHES@CCS
(2022)
Amit Jana
,
Goutam Paul
Differential Fault Attack on PHOTON-Beetle.
ASHES@CCS
(2022)
Alexander Wagner
,
Felix Oberhansl
,
Marc Schink
To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures.
ASHES@CCS
(2022)
Amit Choudhari
,
Sylvain Guilley
,
Khaled Karray
SpecDefender: Transient Execution Attack Defender using Performance Counters.
ASHES@CCS
(2022)
Emre Karabulut
,
Chandu Yuvarajappa
,
Mohammed Iliyas Shaik
,
Seetal Potluri
,
Amro Awad
,
Aydin Aysu
PR Crisis: Analyzing and Fixing Partial Reconfiguration in Multi-Tenant Cloud FPGAs.
ASHES@CCS
(2022)
2021
Calvin Deutschbein
,
Andres Meza
,
Francesco Restuccia
,
Ryan Kastner
,
Cynthia Sturton
Isadora: Automated Information Flow Property Generation for Hardware Designs.
ASHES@CCS
(2021)
ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, Virtual Event, Republic of Korea, 19 November 2021
ASHES@CCS
(2021)
Erland Wittkotter
WaC: Trustworthy Encryption and Communication in an IT Ecosystem with Artificial Superintelligence.
ASHES@CCS
(2021)
Kalle Ngo
,
Elena Dubrova
,
Thomas Johansson
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis.
ASHES@CCS
(2021)
Ruby B. Lee
Speculative Execution Attacks and Hardware Defenses.
ASHES@CCS
(2021)
Thilo Krachenfels
,
Jean-Pierre Seifert
,
Shahin Tajik
Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging.
ASHES@CCS
(2021)
Wenye Liu
,
Chip-Hong Chang
A Forward Error Compensation Approach for Fault Resilient Deep Neural Network Accelerator Design.
ASHES@CCS
(2021)
Farinaz Koushanfar
Machine Learning on Encrypted Data: Hardware to the Rescue.
ASHES@CCS
(2021)
Malik Imran
,
Felipe Almeida
,
Jaan Raik
,
Andrea Basso
,
Sujoy Sinha Roy
,
Samuel Pagliarini
Design Space Exploration of SABER in 65nm ASIC.
ASHES@CCS
(2021)
Yoo-Seung Won
,
Soham Chatterjee
,
Dirmanto Jap
,
Arindam Basu
,
Shivam Bhasin
WaC: First Results on Practical Side-Channel Attacks on Commercial Machine Learning Accelerator.
ASHES@CCS
(2021)
Aurélien Vasselle
,
Hugues Thiebeauld
,
Philippe Maurine
Spatial Dependency Analysis to Extract Information from Side-Channel Mixtures.
ASHES@CCS
(2021)
Tatsuya Oyama
,
Shunsuke Okura
,
Kota Yoshida
,
Takeshi Fujino
Backdoor Attack on Deep Neural Networks Triggered by Fault Injection Attack on Image Sensor Interface.
ASHES@CCS
(2021)
Kunihiro Kuroda
,
Yuta Fukuda
,
Kota Yoshida
,
Takeshi Fujino
Practical Aspects on Non-profiled Deep-learning Side-channel Attacks against AES Software Implementation with Two Types of Masking Countermeasures including RSM.
ASHES@CCS
(2021)
Rony Komissarov
,
Avishai Wool
Spoofing Attacks Against Vehicular FMCW Radar.
ASHES@CCS
(2021)
2020
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2020, Virtual Event, USA, November 13, 2020
ASHES@CCS
(2020)
Mark M. Tehranipoor
The Pursuit of Happiness: Establishing Hardware Root-of-Trust for Cyber Security.
ASHES@CCS
(2020)
Çetin Kaya Koç
Formidable Challenges in Hardware Implementations of Fully Homomorphic Encryption Functions for Applications in Machine Learning.
ASHES@CCS
(2020)
Jacob Fustos
,
Michael Garrett Bechtel
,
Heechul Yun
SpectreRewind: Leaking Secrets to Past Instructions.
ASHES@CCS
(2020)
Ruize Wang
,
Huanyu Wang
,
Elena Dubrova
Far Field EM Side-Channel Attack on AES Using Deep Learning.
ASHES@CCS
(2020)
Sree Ranjani Rajendran
,
Rijoy Mukherjee
,
Rajat Subhra Chakraborty
SoK: Physical and Logic Testing Techniques for Hardware Trojan Detection.
ASHES@CCS
(2020)
Adam Hastings
,
Simha Sethumadhavan
WaC: A New Doctrine for Hardware Security.
ASHES@CCS
(2020)