| Paper ID |
TITLE |
| 3 |
Safeguarding the Intelligence of Neural Networks with Built-in Light-weight Integrity MArks (LIMA) |
| 6 |
HW2VEC: A Graph Learning Tool for Automating Hardware Security |
| 11 |
Automated Detection of Spectre and Meltdown Attacks using Explainable Machine Learning |
| 15 |
Single-Trace Side-Channel Attacks on w-Small Polynomial Sampling with Applications to NTRU, NTRU Prime, and CRYSTALS-Dilithium |
| 17 |
FaultLine: Software-based Fault Injection on Memory Transfers |
| 20 |
SecWalk: Protecting Page Table Walks Against Fault Attacks |
| 21 |
Protecting Indirect Branches against Fault Attacks using ARM Pointer Authentication |
| 27 |
iTimed: Cache Attacks on the Apple A10 Fusion SoC |
| 31 |
Cross-VM Information Leaks in FPGA-Accelerated Cloud Environments |
| 32 |
Time Series-based Malware Detection using Hardware Performance Counters |
| 39 |
A Comparison of Neural Networks for PCB Component Segmentation |
| 41 |
POCA: First Power-on Chip Authentication in Untrusted Foundry and Assembly |
| 45 |
Unclonable Optical Identity for Universal Product Verification |
| 63 |
SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation |
| 74 |
Using Undervolting as an On-Device Defense Against Adversarial Machine Learning Attacks |
| 75 |
Lightweight Encryption using Chaffing and Winnowing with All-or-Nothing Transform for Network-on-Chip Architectures |
| 78 |
Contrastive Graph Convolutional Networks for Hardware Trojan Detection in Third Party IP Cores |
| 80 |
ConNOC: A practical timing channel attack on network-on-chip hardware in a multicore processor |
| 81 |
HERMES: Hardware-Efficient Speculative Dataflow Architecture for Bonsai Merkle Tree-Based Memory Authentication |
| 87 |
RUDBA: Reusable User-Device Biometric Authentication Scheme for Multi-service Systems |
| 89 |
Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and Hardware |
| 95 |
TRRScope: Understanding Target Row Refresh Mechanism for Modern DDR Protection |
| 103 |
NeurObfuscator: A Full-stack Obfuscation Tool to Mitigate Neural Architecture Stealing |
| 110 |
Methodology of Assessing Information Leakage through Software-Accessible Telemetries |
| 119 |
Multiphysics Simulation of EM Side-Channels from Silicon Backside with ML-based Auto-POI Identification |
| 122 |
Fun-SAT: Functional Corruptibility-Guided SAT-Based Attack on Sequential Logic Encryption |
| 124 |
JANUS: Boosting Logic Obfuscation Scope Through Reconfigurable FSM Synthesis
| 129 |
Formal Evaluation and Construction of Glitch-resistant Masked Functions |
|