Sign in
HOST
2008
2013
2018
2023
2008
2023
Keyphrases
Publications
2023
Anthony Zgheib
,
Olivier Potin
,
Jean-Baptiste Rigaud
,
Jean-Max Dutertre
CIFER: Code Integrity and control Flow verification for programs Executed on a RISC-V core.
HOST
(2023)
Minyan Gao
,
Domenic Forte
Detour: Layout-aware Reroute Attack Vulnerability Assessment and Analysis.
HOST
(2023)
Lilian Bossuet
,
Carlos Andres Lara-Nino
Advanced Covert-Channels in Modern SoCs.
HOST
(2023)
Shuohang Peng
,
Bohan Yang
,
Shuying Yin
,
Hang Zhao
,
Cankun Zhao
,
Shaojun Wei
,
Leibo Liu
A Low-Randomness First-Order Masked Xoodyak.
HOST
(2023)
Honggang Yu
,
Shuo Wang
,
Haoqi Shan
,
Maximillian Panoff
,
Michael Lee
,
Kaichen Yang
,
Yier Jin
Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage Analysis.
HOST
(2023)
IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2023, San Jose, CA, USA, May 1-4, 2023
HOST
(2023)
Chenggang Wang
,
Jimmy Dani
,
Shane Reilly
,
Austen Brownfield
,
Boyang Wang
,
John Marty Emmert
TripletPower: Deep-Learning Side-Channel Attacks over Few Traces.
HOST
(2023)
Théophile Gousselot
,
Olivier Thomas
,
Jean-Max Dutertre
,
Olivier Potin
,
Jean-Baptiste Rigaud
Lightweight Countermeasures Against Original Linear Code Extraction Attacks on a RISC-V Core.
HOST
(2023)
Devanshi Upadhyaya
,
Maël Gay
,
Ilia Polian
LEDA: Locking Enabled Differential Analysis of Cryptographic Circuits.
HOST
(2023)
Tommy White
,
Charles Gouert
,
Chengmo Yang
,
Nektarios Georgios Tsoutsos
FHE-Booster: Accelerating Fully Homomorphic Execution with Fine-tuned Bootstrapping Scheduling.
HOST
(2023)
Rakin Muhammad Shadab
,
Yu Zou
,
Sanjay Gandham
,
Mingjie Lin
OMT: A Run-time Adaptive Architectural Framework for Bonsai Merkle Tree-Based Secure Authentication with Embedded Heterogeneous Memory.
HOST
(2023)
Yunkai Bai
,
Jungmin Park
,
Mark M. Tehranipoor
,
Domenic Forte
Dual Channel EM/Power Attack Using Mutual Information and its Real-time Implementation.
HOST
(2023)
Susanne Engels
,
Maik Ender
,
Christof Paar
Targeted Bitstream Fault Fuzzing Accelerating BiFI on Large Designs.
HOST
(2023)
Mateus Simões
,
Lilian Bossuet
,
Nicolas Bruneau
,
Vincent Grosso
,
Patrick Haddad
,
Thomas Sarno
Low-Latency Masking with Arbitrary Protection Order Based on Click Elements.
HOST
(2023)
Daniel Volya
,
Tao Zhang
,
Nashmin Alam
,
Mark M. Tehranipoor
,
Prabhat Mishra
Towards Secure Classical-Quantum Systems.
HOST
(2023)
Brooks Olney
,
Robert Karam
Bits to BNNs: Reconstructing FPGA ML-IP with Joint Bitstream and Side-Channel Analysis.
HOST
(2023)
Md. Sadik Awal
,
Md Tauhidur Rahman
Disassembling Software Instruction Types through Impedance Side-channel Analysis.
HOST
(2023)
Sanjay Deshpande
,
Chuanqi Xu
,
Theodoros Trochatos
,
Hanrui Wang
,
Ferhat Erata
,
Song Han
,
Yongshan Ding
,
Jakub Szefer
Design of Quantum Computer Antivirus.
HOST
(2023)
Mingfei Yu
,
Giovanni De Micheli
Generating Lower-Cost Garbled Circuits: Logic Synthesis Can Help.
HOST
(2023)
Yuanzhe Wu
,
Grant Skipper
,
Ang Cui
Uprooting Trust: Learnings from an Unpatchable Hardware Root-of-Trust Vulnerability in Siemens S7-1500 PLCs.
HOST
(2023)
Sadullah Canakci
,
Chathura Rajapaksha
,
Leila Delshadtehrani
,
Anoop Mysore Nataraja
,
Michael Bedford Taylor
,
Manuel Egele
,
Ajay Joshi
ProcessorFuzz: Processor Fuzzing with Control and Status Registers Guidance.
HOST
(2023)
Pascal Nasahl
,
Salmin Sultana
,
Hans Liljestrand
,
Karanvir Grewal
,
Michael LeMay
,
David M. Durham
,
David Schrammel
,
Stefan Mangard
EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks.
HOST
(2023)
Md. Shohidul Islam
,
Behnam Omidi
,
Ihsen Alouani
,
Khaled N. Khasawneh
VPP: Privacy Preserving Machine Learning via Undervolting.
HOST
(2023)
Guilhèm Assael
,
Philippe Elbaz-Vincent
,
Guillaume Reymond
Improving Single-Trace Attacks on the Number-Theoretic Transform for Cortex-M4.
HOST
(2023)
Sofiane Takarabt
,
Javad Bahrami
,
Mohammad Ebrahimabadi
,
Sylvain Guilley
,
Naghmeh Karimi
Security Order of Gate-Level Masking Schemes.
HOST
(2023)
Anuj Dubey
,
Rosario Cammarota
,
Avinash Varna
,
Raghavan Kumar
,
Aydin Aysu
Hardware-Software Co-design for Side-Channel Protected Neural Network Inference.
HOST
(2023)
Kaitlin N. Smith
,
Joshua Viszlai
,
Lennart Maximilian Seifert
,
Jonathan M. Baker
,
Jakub Szefer
,
Frederic T. Chong
Fast Fingerprinting of Cloud-based NISQ Quantum Computers.
HOST
(2023)
Owen Millwood
,
Hongming Fei
,
Prosanta Gope
,
Oguz Narli
,
Meltem Kurt Pehlivanoglu
,
Elif Bilge Kavun
,
Biplab Sikdar
A Privacy-Preserving Protocol Level Approach to Prevent Machine Learning Modelling Attacks on PUFs in the Presence of Semi-Honest Verifiers.
HOST
(2023)
Adeen Ayub
,
Nauman Zubair
,
Hyunguk Yoo
,
Wooyeon Jo
,
Irfan Ahmed
Gadgets of Gadgets in Industrial Control Systems: Return Oriented Programming Attacks on PLCs.
HOST
(2023)
Nadja Ramhöj Holtryd
,
Madhavan Manivannan
,
Per Stenström
SCALE: Secure and Scalable Cache Partitioning.
HOST
(2023)
Anomadarshi Barua
,
Mohammad Abdullah Al Faruque
MagHop: Magnetic Spectrum Hopping for Securing Voltage and Current Magnetic Sensors.
HOST
(2023)
2022
Ruben Purdy
,
Danielle Duvalsaint
,
R. D. Shawn Blanton
Secuirty Metrics for Logic Circuits.
HOST
(2022)
Reshmi Suragani
,
Emiliia Nazarenko
,
Nikolaos Athanasios Anagnostopoulos
,
Nico Mexis
,
Elif Bilge Kavun
Identification and Classification of Corrupted PUF Responses via Machine Learning.
HOST
(2022)
Dipanjan Roy
,
Sabiya Jani Shaik
,
Sonam Sharma
Securing Hardware Accelerator during High-level Synthesis.
HOST
(2022)
Gaëtan Leplus
,
Olivier Savry
,
Lilian Bossuet
Insertion of random delay with context-aware dummy instructions generator in a RISC-V processor.
HOST
(2022)
Tarun Solanki
,
Biswabandan Panda
SpecPref: High Performing Speculative Attacks Resilient Hardware Prefetchers.
HOST
(2022)
Ying Zhang
,
Yuanxiang Li
,
Xin Chen
,
Jizhong Yang
,
Yifeng Hua
,
Jiaoyan Yao
PUF-based Secure Test Wrapper Design for Network-on-Chip.
HOST
(2022)
Saikat Majumdar
,
Mohammad Hossein Samavatian
,
Radu Teodorescu
Characterizing Side-Channel Leakage of DNN Classifiers though Performance Counters.
HOST
(2022)
Lingjuan Wu
,
Xuelin Zhang
,
Siyi Wang
,
Wei Hu
Hardware Trojan Detection at LUT: Where Structural Features Meet Behavioral Characteristics.
HOST
(2022)
Mohammad Ebrahimabadi
,
Suhee Sanjana Mehjabin
,
Raphael Viera
,
Sylvain Guilley
,
Jean-Luc Danger
,
Jean-Max Dutertre
,
Naghmeh Karimi
Detecting Laser Fault Injection Attacks via Time-to-Digital Converter Sensors.
HOST
(2022)
Nafis Irtija
,
Eirini-Eleni Tsiropoulou
,
Cyrus Minwalla
,
Jim Plusquellic
True Random Number Generation with the Shift-register Reconvergent-Fanout (SiRF) PUF.
HOST
(2022)
Tsion Yimer
,
Edmund Smith
,
Paige Harvey
,
Marcial Tienteu
,
Kevin T. Kornegay
Error Correction Attacks on BACnet MS/TP.
HOST
(2022)
Lang Lin
,
Jimin Wen
,
Harsh Shrivastav
,
Weike Li
,
Hua Chen
,
Gang Ni
,
Sreeja Chowdhury
,
Calvin Chow
,
Norman Chang
Layout-level Vulnerability Ranking from Electromagnetic Fault Injection.
HOST
(2022)
Daniel Canaday
,
Wendson A. S. Barbosa
,
Andrew Pomerance
A Novel Attack on Machine-Learning Resistant Physical Unclonable Functions.
HOST
(2022)
Ying Li
,
Lan Chen
,
Jian Wang
,
Guanfei Gong
Partial Reconfiguration for Run-time Memory Faults and Hardware Trojan Attacks Detection.
HOST
(2022)
Amin Rezaei
,
Ava Hedayatipour
,
Hossein Sayadi
,
Mehrdad Aliasgari
,
Hai Zhou
Global Attack and Remedy on IC-Specific Logic Encryption.
HOST
(2022)
Yun Liu
,
Yongliang Chen
,
Xiaole Cui
A Modeling Attack on the Sub-threshold Current Array PUF.
HOST
(2022)
Mahmoud AbdelHafeez
,
Mostafa Taha
Oblivious Intrusion Detection System.
HOST
(2022)
Tolulope A. Odetola
,
Adewale Adeyemo
,
Syed Rafay Hasan
Hardening Hardware Accelerartor Based CNN Inference Phase Against Adversarial Noises.
HOST
(2022)
Ankit Mittal
,
Aatmesh Shrivastava
Detecting Continuous Jamming Attack using Ultra-low Power RSSI Circuit.
HOST
(2022)