Login / Signup
CS2@HiPEAC
2014
2018
2014
2018
Keyphrases
Publications
2018
Flavio D. Garcia
Automotive Cyber Security: Lessons Learned and Research Challenges.
CS2@HiPEAC
(2018)
Luciano Bozzi
,
Lorenzo Di Giuseppe
,
Luigi Pomante
,
Marco Pugliese
,
Marco Santic
,
Fortunato Santucci
,
Walter Tiberti
TinyWIDS: a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks.
CS2@HiPEAC
(2018)
Felipe Valencia
,
Tobias Oder
,
Tim Güneysu
,
Francesco Regazzoni
Exploring the Vulnerability of R-LWE Encryption to Fault Attacks.
CS2@HiPEAC
(2018)
Alessandro Di Federico
rev.ng: A Tale of Reverse Engineering, Dynamic Analysis and Translation of Binaries Using QEMU and LLVM.
CS2@HiPEAC
(2018)
Damien Couroussé
,
Thierno Barry
,
Bruno Robisson
,
Nicolas Belleville
,
Philippe Jaillon
,
Olivier Potin
,
Hélène Le Bouder
,
Jean-Louis Lanet
,
Karine Heydemann
All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems.
CS2@HiPEAC
(2018)
Halil Kemal Taskin
,
Murat Cenk
Speeding up Curve25519 using Toeplitz Matrix-vector Multiplication.
CS2@HiPEAC
(2018)
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018
CS2@HiPEAC
(2018)
2017
Hermann Seuschek
,
Fabrizio De Santis
,
Oscar M. Guillen
Side-channel leakage aware instruction scheduling.
CS2@HiPEAC
(2017)
Karim M. Abdellatif
,
Damien Couroussé
,
Olivier Potin
,
Philippe Jaillon
Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures.
CS2@HiPEAC
(2017)
Sha Tao
,
Elena Dubrova
Reliable low-overhead arbiter-based physical unclonable functions for resource-constrained IoT devices.
CS2@HiPEAC
(2017)
Florian Wilde
Large scale characterization of SRAM on infineon XMC microcontrollers as PUF.
CS2@HiPEAC
(2017)
Frank K. Gürkaynak
,
Robert Schilling
,
Michael Muehlberghuber
,
Francesco Conti
,
Stefan Mangard
,
Luca Benini
Multi-core data analytics SoC with a flexible 1.76 Gbit/s AES-XTS cryptographic accelerator in 65 nm CMOS.
CS2@HiPEAC
(2017)
Miraje Gentilal
,
Paulo Martins
,
Leonel Sousa
TrustZone-backed bitcoin wallet.
CS2@HiPEAC
(2017)
Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24, 2017
CS2@HiPEAC
(2017)
2016
Sandhya Koteshwara
,
Chris H. Kim
,
Keshab K. Parhi
Mode-based Obfuscation using Control-Flow Modifications.
CS2@HiPEAC
(2016)
Venu Nalla
,
Rajeev Anand Sahu
,
Vishal Saraswat
Differential Fault Attack on SIMECK.
CS2@HiPEAC
(2016)
Apostolos P. Fournaris
,
Nicolas Sklavos
,
Christos Koulamas
A High Speed Scalar Multiplier for Binary Edwards Curves.
CS2@HiPEAC
(2016)
Thierno Barry
,
Damien Couroussé
,
Bruno Robisson
Compilation of a Countermeasure Against Instruction-Skip Fault Attacks.
CS2@HiPEAC
(2016)
Noemie Beringuier-Boher
,
Marc Lacruche
,
David El-Baze
,
Jean-Max Dutertre
,
Jean-Baptiste Rigaud
,
Philippe Maurine
Body Biasing Injection Attacks in Practice.
CS2@HiPEAC
(2016)
Ahmed Saeed
,
Ali Ahmadinia
,
Mike Just
Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses.
CS2@HiPEAC
(2016)
Karim M. Abdellatif
,
Roselyne Chotin-Avot
,
Habib Mehrez
AEGIS-Based Efficient Solution for Secure Reconfiguration of FPGAs.
CS2@HiPEAC
(2016)
Hermann Seuschek
,
Johann Heyszl
,
Fabrizio De Santis
A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes.
CS2@HiPEAC
(2016)
Reza Azarderakhsh
,
Koray Karabina
Efficient Algorithms and Architectures for Double Point Multiplication on Elliptic Curves.
CS2@HiPEAC
(2016)
Vincent Immler
,
Maxim Hennig
,
Ludwig Kürzinger
,
Georg Sigl
Practical Aspects of Quantization and Tamper-Sensitivity for Physically Obfuscated Keys.
CS2@HiPEAC
(2016)
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016
CS2@HiPEAC
(2016)
2015
Mathieu Carbone
,
Yannick Teglia
,
Philippe Maurine
,
Gilles R. Ducharme
Interest of MIA in frequency domain?
CS2@HiPEAC
(2015)
Mohsen Toorani
On Continuous After-the-Fact Leakage-Resilient Key Exchange.
CS2@HiPEAC
(2015)
Alexander Herrmann
,
Marc Stöttinger
Evaluation Tools for Multivariate Side-Channel Analysis.
CS2@HiPEAC
(2015)
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015
CS2@HiPEAC
(2015)
Rainer Plaga
,
Dominik Merli
A new Definition and Classification of Physical Unclonable Functions.
CS2@HiPEAC
(2015)
Apostolos P. Fournaris
,
Nicolaos Klaoudatos
,
Nicolas Sklavos
,
Christos Koulamas
Fault and Power Analysis Attack Resistant RNS based Edwards Curve Point Multiplication.
CS2@HiPEAC
(2015)
Paulo Martins
,
Leonel Sousa
Stretching the limits of Programmable Embedded Devices for Public-key Cryptography.
CS2@HiPEAC
(2015)
Loïc Zussa
,
Ingrid Exurville
,
Jean-Max Dutertre
,
Jean-Baptiste Rigaud
,
Bruno Robisson
,
Assia Tria
,
Jessy Clédière
Evidence of an information leakage between logically independent blocks.
CS2@HiPEAC
(2015)
Harris E. Michail
,
Lenos Ioannou
,
Artemios G. Voyiatzis
Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis.
CS2@HiPEAC
(2015)
Wei He
,
Alexander Herrmann
Placement Security Analysis for Side-Channel Resistant Dual-Rail Scheme in FPGA.
CS2@HiPEAC
(2015)
2014
Michael Lackner
,
Reinhard Berlach
,
Reinhold Weiss
,
Christian Steger
Countering type confusion and buffer overflow attacks on Java smart cards by data type sensitive obfuscation.
CS2@HiPEAC
(2014)
Raphael Spreitzer
,
Jörn-Marc Schmidt
Group-signature schemes on constrained devices: the gap between theory and practice.
CS2@HiPEAC
(2014)
Vishal Saraswat
,
Daniel Feldman
,
Denis Foo Kune
,
Satyajit Das
Remote cache-timing attacks against AES.
CS2@HiPEAC
(2014)
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014
CS2@HiPEAC
(2014)
Jean-Luc Danger
,
Nicolas Debande
,
Sylvain Guilley
,
Youssef Souissi
High-order timing attacks.
CS2@HiPEAC
(2014)
Pierre Schnarz
,
Joachim Wietzke
,
Ingo Stengel
Towards attacks on restricted memory areas through co-processors in embedded multi-OS environments via malicious firmware injection.
CS2@HiPEAC
(2014)
Stjepan Picek
,
Baris Ege
,
Lejla Batina
,
Domagoj Jakobovic
,
Lukasz Chmielewski
,
Marin Golub
On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box.
CS2@HiPEAC
(2014)
Robert M. Seepers
,
Christos Strydis
,
Ioannis Sourdis
,
Chris I. De Zeeuw
Adaptive entity-identifier generation for IMD emergency access.
CS2@HiPEAC
(2014)
Kamil Gomina
,
Philippe Gendrier
,
Philippe Candelier
,
Jean-Baptiste Rigaud
,
Assia Tria
Detecting positive voltage attacks on CMOS circuits.
CS2@HiPEAC
(2014)
Reinhard Berlach
,
Michael Lackner
,
Christian Steger
,
Johannes Loinig
,
Ernst Haselsteiner
Memory-efficient on-card byte code verification for Java cards.
CS2@HiPEAC
(2014)