Search dblp for Publications

export results for "toc:db/conf/isca/hasp2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/isca/0020V14,
  author       = {Jie Chen and
                  Guru Venkataramani},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {An algorithm for detecting contention-based covert timing channels
                  on shared hardware},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611766},
  doi          = {10.1145/2611765.2611766},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/0020V14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/BhasinDGN14,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side-channel leakage and trace compression using normalized inter-class
                  variance},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {7:1--7:9},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611772},
  doi          = {10.1145/2611765.2611772},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/BhasinDGN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ChoutaGDBBBFC14,
  author       = {Taoufik Chouta and
                  Tarik Graba and
                  Jean{-}Luc Danger and
                  Julien Bringer and
                  Ma{\"{e}}l Berthier and
                  Yves Bocktaels and
                  M{\'{e}}lanie Favre and
                  Herv{\'{e}} Chabanne},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side channel analysis on an embedded hardware fingerprint biometric
                  comparator {\&} low cost countermeasures},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {6:1--6:6},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611771},
  doi          = {10.1145/2611765.2611771},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ChoutaGDBBBFC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/DhawanVRCSKPD14,
  author       = {Udit Dhawan and
                  Nikos Vasilakis and
                  Raphael Rubin and
                  Silviu Chiricescu and
                  Jonathan M. Smith and
                  Thomas F. Knight Jr. and
                  Benjamin C. Pierce and
                  Andr{\'{e}} DeHon},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {{PUMP:} a programmable unit for metadata processing},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {8:1--8:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611773},
  doi          = {10.1145/2611765.2611773},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/DhawanVRCSKPD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/FerrettiMM14,
  author       = {Claudio Ferretti and
                  Silvia Mella and
                  Filippo Melzani},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {The role of the fault model in {DFA} against {AES}},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611769},
  doi          = {10.1145/2611765.2611769},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/FerrettiMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/GunduSSPJBT14,
  author       = {Akhila Gundu and
                  Gita Sreekumar and
                  Ali Shafiee and
                  Seth H. Pugsley and
                  Hardik B. Jain and
                  Rajeev Balasubramonian and
                  Mohit Tiwari},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Memory bandwidth reservation in the cloud to avoid information leakage
                  in the memory controller},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {11:1--11:5},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611776},
  doi          = {10.1145/2611765.2611776},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/GunduSSPJBT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/KazdagliHRT14,
  author       = {Mikhail Kazdagli and
                  Ling Huang and
                  Vijay Janapa Reddi and
                  Mohit Tiwari},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Morpheus: benchmarking computational diversity in mobile malware},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {3:1--3:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611767},
  doi          = {10.1145/2611765.2611767},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/KazdagliHRT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/SwamySLFK14,
  author       = {Tushar Swamy and
                  Neel Shah and
                  Pei Luo and
                  Yunsi Fei and
                  David R. Kaeli},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Scalable and efficient implementation of correlation power analysis
                  using graphics processing units (GPUs)},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {10:1--10:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611775},
  doi          = {10.1145/2611765.2611775},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/SwamySLFK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/SzeferB14,
  author       = {Jakub Szefer and
                  Sebastian Biedermann},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Towards fast hardware memory integrity checking with skewed Merkle
                  trees},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {9:1--9:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611774},
  doi          = {10.1145/2611765.2611774},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/SzeferB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/XuSD14,
  author       = {Lei Xu and
                  Weidong Shi and
                  Nicholas DeSalvo},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Seasoning effect based side channel attacks to {AES} implementation
                  with phase change memory},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {5:1--5:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611770},
  doi          = {10.1145/2611765.2611770},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/XuSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/YueRWC14,
  author       = {Mengchao Yue and
                  William H. Robinson and
                  Lanier A. Watkins and
                  Cherita L. Corbett},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Constructing timing-based covert channels in mobile networks by adjusting
                  {CPU} frequency},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {2:1--2:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611768},
  doi          = {10.1145/2611765.2611768},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/YueRWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isca/2014hasp,
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765},
  doi          = {10.1145/2611765},
  isbn         = {978-1-4503-2777-0},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/2014hasp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics