No abstract available.
Proceeding Downloads
SoK Paper: Power Side-Channel Malware Detection
Analyzing power consumption has been proposed as an effective way to detect anomalous system behavior. The power side channel provides a non-intrusive and not easily compromisable out-of-band malware detection mechanism, which is especially beneficial for ...
Towards Effective Machine Learning Models for Ransomware Detection via Low-Level Hardware Information
In recent years, ransomware attacks have grown dramatically. New variants continually emerging make tracking and mitigating these threats increasingly difficult using traditional detection methods. As the landscape of ransomware evolves, there is a ...
Position Paper: From Confidential Computing to Zero Trust, Come Along for the (Bumpy?) Ride
- Mengmei Ye,
- Sandhya Koteshwara,
- Derren Dunn,
- Hubertus Franke,
- Chris Porter,
- Tobin Feldman-Fitzthum,
- Angelo Ruocco,
- Daniele Buono,
- Claudio Carvalho
Increasingly, business opportunities available to various types of industries, such as semiconductor chip designs with electronic design automation (EDA), digitalization and innovations in automotives, far exceed those addressable with on-prem compute ...
SoK Paper: Security Concerns in Quantum Machine Learning as a Service
Quantum machine learning (QML) is a category of algorithms that uses variational quantum circuits (VQCs) to solve machine learning tasks. Recent works have shown that QML models can effectively generalize from limited training data samples. This ...
TPU as Cryptographic Accelerator
- Rabimba Karanjai,
- Sangwon Shin,
- Wujie Xiong,
- Xinxin Fan,
- Lin Chen,
- Tianwei Zhang,
- Taeweon Suh,
- Weidong Shi,
- Veronika Kuchta,
- Francesco Sica,
- Lei Xu
Cryptographic schemes like Fully Homomorphic Encryption (FHE) and Zero-Knowledge Proofs (ZKPs), while offering powerful privacy-preserving capabilities, are often hindered by their computational complexity. Polynomial multiplication, a core operation in ...
Short Paper: Analysis of Vivado implementation strategies regarding side-channel leakage for FPGA-based AES implementations
Dynamic restructuring of cryptographic implementations has been proposed as a viable countermeasure against power and electro-magnetic-based Side Channel Attacks (SCA). These kind of countermeasures involve shuffling between functionally identical but ...
Cryptographic Memory Tagging: Towards Stateless Integrity
Memory safety violations like simple buffer overflows, or use-after-free are still prevalent issues in modern computing. One way of precluding them is to impose some lightweight form of access control via memory tagging. However, a straightforward ...
Index Terms
- Proceedings of the International Workshop on Hardware and Architectural Support for Security and Privacy 2024
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
HASP '13 | 13 | 9 | 69% |
Overall | 13 | 9 | 69% |