default search action
HASP@ISCA 2013: Tel-Aviv, Israel
- Ruby B. Lee, Weidong Shi:
HASP 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013. ACM 2013, ISBN 978-1-4503-2118-1 - Michael Muehlberghuber, Frank K. Gürkaynak, Thomas Korak, Philipp Dunst, Michael Hutter:
Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC. 1 - Tianwei Zhang, Fangfei Liu, Si Chen, Ruby B. Lee:
Side channel vulnerability metrics: the promise and the pitfalls. 2 - Fangfei Liu, Ruby B. Lee:
Security testing of a secure cache design. 3 - Zouha Cherif, Jean-Luc Danger, Florent Lozach, Yves Mathieu, Lilian Bossuet:
Evaluation of delay PUFs on CMOS 65 nm technology: ASIC vs FPGA. 4 - Shizun Ge, Zhen Wang, Pei Luo, Mark G. Karpovsky:
Secure memories resistant to both random errors and fault injection attacks using nonlinear error correction codes. 5 - Juan Carlos Martínez Santos, Yunsi Fei:
Micro-architectural support for metadata coherence in multi-core dynamic information flow tracking. 6 - Yossef Oren, Ofir Weisse, Avishai Wool:
Practical template-algebraic side channel attacks with extremely low data complexity. 7 - Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay:
Unraveling timewarp: what all the fuzz is about? 8 - Claude Carlet, Sylvain Guilley:
Side-channel indistinguishability. 9 - Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V. Rozas, Hisham Shafi, Vedvyas Shanbhogue, Uday R. Savagaonkar:
Innovative instructions and software model for isolated execution. 10 - Matthew Hoekstra, Reshma Lal, Pradeep Pappachan, Vinay Phegade, Juan del Cuvillo:
Using innovative instructions to create trustworthy software solutions. 11
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.