default search action
HOST 2024: Tysons Corner, VA, USA
- IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, Tysons Corner, VA, USA, May 6-9, 2024. IEEE 2024, ISBN 979-8-3503-7394-3
- Haoqi Shan, Sravani Nissankararao, Yujia Liu, Moyao Huang, Shuo Wang, Yier Jin, Dean Sullivan:
LightEMU: Hardware Assisted Fuzzing of Trusted Applications. 1-11 - Nasr-Eddine Ouldei Tebina, Aghiles Douadi, Luc Salvo, Vincent Beroulle, Nacer-Eddine Zergainoh, Guillaume Hubert, Elena Ioana Vatajelu, Giorgio Di Natale, Paolo Maistri:
Non-Invasive Attack on Ring Oscillator-Based PUFs Through Localized X-Ray Irradiation. 1-11 - Christian Rasmussen, Samah Mohamed Saeed:
Time-Aware Re-Synthesis for Secure Quantum Systems. 1-6 - Tianhong Xu, Aidong Adam Ding, Yunsi Fei:
TrustZoneTunnel: A Cross-World Pattern History Table-Based Microarchitectural Side-Channel Attack. 1-11 - Shamik Kundu, Navnil Choudhury, Sanjay Das, Arnab Raha, Kanad Basu:
QNAD: Quantum Noise Injection for Adversarial Defense in Deep Neural Networks. 1-11 - Xiaomei Zeng, Qing Liu, Samuel Chef, Chee Lip Gan:
A Security Assessment of Protected Execute-Only Firmware in Microcontrollers Through Selective Chemical Engraving. 12-20 - Md Faizul Bari, Shreyas Sen:
NoiseHopper: Emission Hopping Air-Gap Covert Side Channel with Lower Probability of Detection. 21-32 - Hasini Witharana, Debapriya Chatterjee, Prabhat Mishra:
Verifying Memory Confidentiality and Integrity of Intel TDX Trusted Execution Environments. 44-54 - Chuanqi Xu, Jamie Sikora, Jakub Szefer:
A Thorough Study of State Leakage Mitigation in Quantum Computing with One-Time Pad. 55-65 - Mark Lee, Chris Clark, Saibal Mukhopadhyay:
A Pre-Silicon Physical Design Study Towards Mitigating EMSCA on Cryptographic ICs. 66-69 - Sönke Jendral, Kalle Ngo, Ruize Wang, Elena Dubrova:
Breaking SCA-Protected CRYSTALS-Kyber with a Single Trace. 70-73 - Saikat Majumdar, Radu Teodorescu:
Voltage Noise-Based Adversarial Attacks on Machine Learning Inference in Multi-Tenant FPGA Accelerators. 80-85 - Upasana Mandal, Sarani Bhattacharya, Debdeep Mukhopadhyay:
Cache Wars: A Comparative Study of UMWAIT, UMONITOR, and Prime-Probe Attacks. 86-89 - Emre Karabulut, Aydin Aysu:
A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature. 90-100 - Alán Rodrigo Díaz Rizo, Abdelrahman Emad Abdelazim, Hassan Aboushady, Haralampos-G. Stratigopoulos:
Covert Communication Channels Based On Hardware Trojans: Open-Source Dataset and AI-Based Detection. 101-106 - Henian Li, Lang Lin, Norman Chang, Sreeja Chowdhury, Dylan Mcguire, Bozidar Novakovic, Kazuki Monta, Makoto Nagata, Ying-Shiun Li, Pramod M. S, Piin-Chen Yeh, Jyh-Shing Roger Jang, Chengjie Xi, Qiutong Jin, Navid Asadi, Mark M. Tehranipoor:
Photon Emission Modeling and Machine-Learning Assisted Pre-Silicon Optical Side-Channel Simulation. 107-111 - Matthias Probst, Manuel Brosch, Michael Gruber, Georg Sigl:
DOMREP II. 112-121 - Vincent Meyers, Michael Hefenbrock, Dennis Gnad, Mehdi B. Tahoori:
Trained to Leak: Hiding Trojan Side-Channels in Neural Network Weights. 122-127 - Avinash Ayalasomayajula, Nusrat Farzana, Debjit Pal, Farimah Farahmandi:
Prioritizing Information Flow Violations: Generation of Ranked Security Assertions for Hardware Designs. 128-138 - Harshit Saurabh, Anupam Golder, Samarth Shivakumar Titti, Suparna Kundu, Chaoyun Li, Angshuman Karmakar, Debayan Das:
SNOW-SCA: ML-Assisted Side-Channel Attack on SNOW-V. 139-149 - Hang Zhao, Cankun Zhao, Wenping Zhu, Bohan Yang, Shaojun Wei, Leibo Liu:
Sparse Polynomial Multiplication-Based High-Performance Hardware Implementation for CRYSTALS-Dilithium. 150-159 - Sanjay Das, Shamik Kundu, Kanad Basu:
Explainability to the Rescue: A Pattern-Based Approach for Detecting Adversarial Attacks. 160-170 - Samit Shahnawaz Miftah, Shamik Kundu, Austin Mordahl, Shiyi Wei, Kanad Basu:
RTL-Spec: RTL Spectrum Analysis for Security Bug Localization. 171-181 - Adeen Ayub, Wooyeon Jo, Irfan Ahmed:
Charlie, Charlie, Charlie on Industrial Control Systems: PLC Control Logic Attacks by Design, Not by Chance. 182-193 - Karthik Swaminathan, Ramon Bertran, Alper Buyuktosunoglu, Pradip Bose:
FitBit: Ensuring Robust and Secure Execution Through Runtime-Generated Stressmarks. 194-198 - Barbara Gigerl, Kevin Pretterhofer, Stefan Mangard:
Security Aspects of Masking on FPGAs. 199-210 - Tasnuva Farheen, Sourav Roy, Jia Di, Shahin Tajik, Domenic Forte:
Calibratable Polymorphic Temperature Sensor for Detecting Fault Injection and Side-Channel Attacks. 211-221 - Jeferson González-Gómez, Hassan Nassar, Lars Bauer, Jörg Henkel:
LightFAt: Mitigating Control-Flow Explosion via Lightweight PMU-Based Control-Flow Attestation. 222-226 - Jiaming Wu, Olivia P. Dizon-Paradis, M. Sazadur Rahman, Damon L. Woodard, Domenic Forte:
DOSCrack: Deobfuscation Using Oracle-Guided Symbolic Execution and Clustering of Binary Security Keys. 227-232 - Dipayan Saha, Katayoon Yahyaei, Sujan Kumar Saha, Mark M. Tehranipoor, Farimah Farahmandi:
Empowering Hardware Security with LLM: The Development of a Vulnerable Hardware Database. 233-243 - Zhenzhe Chen, Takashi Sato, Hirofumi Shinohara:
SpongePUF: A Modeling Attack Resilient Strong PUF with Scalable Challenge Response Pair. 244-253 - Athanasios Moschos, Fabian Monrose, Angelos D. Keromytis:
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans. 254-259 - Sudipta Paria, Aritra Dasgupta, Swarup Bhunia:
DiSPEL: A Framework for SoC Security Policy Synthesis and Distributed Enforcement. 271-281 - Sumanth N. Karanth, Sirish Oruganti, Meizhi Wang, Jaydeep P. Kulkarni:
Randomization Approaches for Secure SAR ADC Design Resilient Against Power Side-Channel Attacks. 282-292 - Zachary DiMeglio, Jenna Bustami, Deniz Gurevin, Chenglu Jin, Marten van Dijk, Omer Khan:
Masked Memory Primitive for Key Insulated Schemes. 293-303 - Rakin Muhammad Shadab, Yu Zou, Mingjie Lin:
CTR+: A High-Performance Metadata Access Scheme for Secure Embedded Memory in Heterogeneous Computing Systems. 304-308 - Hongming Fei, Owen Millwood, Prosanta Gope, Jack Miskelly, Biplab Sikdar:
PhenoAuth: A Novel PUF-Phenotype-Based Authentication Protocol for IoT Devices. 309-319 - Haipeng Li, Mabon Ninan, Boyang Wang, John Marty Emmert:
TinyPower: Side-Channel Attacks with Tiny Neural Networks. 320-331 - Cheng Gongye, Yunsi Fei:
One Flip Away from Chaos: Unraveling Single Points of Failure in Quantized DNN s. 332-342 - Anis Fellah-Touta, Lilian Bossuet, Carlos Andres Lara-Nino:
A Lightweight Non-Oscillatory Delay-Sensor for Remote Power Analysis. 343-348 - Aman Singh, Biswabandan Panda:
Rowhammer Cache: A Last-Level Cache for Low-Overhead Rowhammer Tracking. 349-360 - Neelofar Hassan, Urbi Chatterjee:
Machine Learning Attacks on Challenge-Response Obfuscations in Strong PUFs. 361-372 - Hossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan:
Data-Oblivious ML Accelerators Using Hardware Security Extensions. 373-377 - Nimish Mishra, Tridib Lochan Dutta, Shubhi Shukla, Anirban Chakraborty, Debdeep Mukhopadhyay:
Too Hot to Handle: Novel Thermal Side-Channel in Power Attack-Protected Intel Processors. 378-382 - Lilas Alrahis, Hassan Nassar, Jonas Krautter, Dennis Gnad, Lars Bauer, Jörg Henkel, Mehdi B. Tahoori:
MaliGNNoma: GNN-Based Malicious Circuit Classifier for Secure Cloud FPGAs. 383-393 - Bharadwaj Madabhushi, Chandra Sekhar Mummidi, Sandip Kundu, Daniel E. Holcomb:
Resurrection Attack: Defeating Xilinx MPU's Memory Protection. 394-403 - Theodoros Trochatos, Sanjay Deshpande, Chuanqi Xu, Yao Lu, Yongshan Ding, Jakub Szefer:
Dynamic Pulse Switching for Protection of Quantum Computation on Untrusted Clouds. 404-414 - Jessie Chen, Jakub Szefer:
All Your Base Are Belong To Us: Stealing VRP Secrets from Quantum Circuit Structures. 415-419 - Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella:
A High Efficiency Hardware Design for the Post-Quantum KEM HQC. 431-441
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.