Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/isca/hasp2014.bht:"
@inproceedings{DBLP:conf/isca/0020V14, author = {Jie Chen and Guru Venkataramani}, editor = {Ruby B. Lee and Weidong Shi}, title = {An algorithm for detecting contention-based covert timing channels on shared hardware}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611766}, doi = {10.1145/2611765.2611766}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/0020V14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/BhasinDGN14, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side-channel leakage and trace compression using normalized inter-class variance}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {7:1--7:9}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611772}, doi = {10.1145/2611765.2611772}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/BhasinDGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ChoutaGDBBBFC14, author = {Taoufik Chouta and Tarik Graba and Jean{-}Luc Danger and Julien Bringer and Ma{\"{e}}l Berthier and Yves Bocktaels and M{\'{e}}lanie Favre and Herv{\'{e}} Chabanne}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side channel analysis on an embedded hardware fingerprint biometric comparator {\&} low cost countermeasures}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {6:1--6:6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611771}, doi = {10.1145/2611765.2611771}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/ChoutaGDBBBFC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/DhawanVRCSKPD14, author = {Udit Dhawan and Nikos Vasilakis and Raphael Rubin and Silviu Chiricescu and Jonathan M. Smith and Thomas F. Knight Jr. and Benjamin C. Pierce and Andr{\'{e}} DeHon}, editor = {Ruby B. Lee and Weidong Shi}, title = {{PUMP:} a programmable unit for metadata processing}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {8:1--8:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611773}, doi = {10.1145/2611765.2611773}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/DhawanVRCSKPD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/FerrettiMM14, author = {Claudio Ferretti and Silvia Mella and Filippo Melzani}, editor = {Ruby B. Lee and Weidong Shi}, title = {The role of the fault model in {DFA} against {AES}}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611769}, doi = {10.1145/2611765.2611769}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/FerrettiMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/GunduSSPJBT14, author = {Akhila Gundu and Gita Sreekumar and Ali Shafiee and Seth H. Pugsley and Hardik B. Jain and Rajeev Balasubramonian and Mohit Tiwari}, editor = {Ruby B. Lee and Weidong Shi}, title = {Memory bandwidth reservation in the cloud to avoid information leakage in the memory controller}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {11:1--11:5}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611776}, doi = {10.1145/2611765.2611776}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/GunduSSPJBT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/KazdagliHRT14, author = {Mikhail Kazdagli and Ling Huang and Vijay Janapa Reddi and Mohit Tiwari}, editor = {Ruby B. Lee and Weidong Shi}, title = {Morpheus: benchmarking computational diversity in mobile malware}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {3:1--3:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611767}, doi = {10.1145/2611765.2611767}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/KazdagliHRT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/SwamySLFK14, author = {Tushar Swamy and Neel Shah and Pei Luo and Yunsi Fei and David R. Kaeli}, editor = {Ruby B. Lee and Weidong Shi}, title = {Scalable and efficient implementation of correlation power analysis using graphics processing units (GPUs)}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {10:1--10:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611775}, doi = {10.1145/2611765.2611775}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/SwamySLFK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/SzeferB14, author = {Jakub Szefer and Sebastian Biedermann}, editor = {Ruby B. Lee and Weidong Shi}, title = {Towards fast hardware memory integrity checking with skewed Merkle trees}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {9:1--9:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611774}, doi = {10.1145/2611765.2611774}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/SzeferB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/XuSD14, author = {Lei Xu and Weidong Shi and Nicholas DeSalvo}, editor = {Ruby B. Lee and Weidong Shi}, title = {Seasoning effect based side channel attacks to {AES} implementation with phase change memory}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {5:1--5:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611770}, doi = {10.1145/2611765.2611770}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/XuSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/YueRWC14, author = {Mengchao Yue and William H. Robinson and Lanier A. Watkins and Cherita L. Corbett}, editor = {Ruby B. Lee and Weidong Shi}, title = {Constructing timing-based covert channels in mobile networks by adjusting {CPU} frequency}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {2:1--2:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611768}, doi = {10.1145/2611765.2611768}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/YueRWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isca/2014hasp, editor = {Ruby B. Lee and Weidong Shi}, title = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765}, doi = {10.1145/2611765}, isbn = {978-1-4503-2777-0}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/2014hasp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.