Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3696843acmotherconferencesBook PagePublication PageshaspConference Proceedingsconference-collections
HASP '24: Proceedings of the International Workshop on Hardware and Architectural Support for Security and Privacy 2024
ACM2024 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
HASP '24: International Workshop on Hardware and Architectural Support for Security and Privacy 2024 Austin TX USA 2 November 2024
ISBN:
979-8-4007-1221-0
Published:
02 November 2024

Reflects downloads up to 18 Nov 2024Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
research-article
Open Access
SoK Paper: Power Side-Channel Malware Detection

Analyzing power consumption has been proposed as an effective way to detect anomalous system behavior. The power side channel provides a non-intrusive and not easily compromisable out-of-band malware detection mechanism, which is especially beneficial for ...

research-article
Open Access
Towards Effective Machine Learning Models for Ransomware Detection via Low-Level Hardware Information

In recent years, ransomware attacks have grown dramatically. New variants continually emerging make tracking and mitigating these threats increasingly difficult using traditional detection methods. As the landscape of ransomware evolves, there is a ...

research-article
Open Access
Position Paper: From Confidential Computing to Zero Trust, Come Along for the (Bumpy?) Ride

Increasingly, business opportunities available to various types of industries, such as semiconductor chip designs with electronic design automation (EDA), digitalization and innovations in automotives, far exceed those addressable with on-prem compute ...

research-article
Open Access
SoK Paper: Security Concerns in Quantum Machine Learning as a Service

Quantum machine learning (QML) is a category of algorithms that uses variational quantum circuits (VQCs) to solve machine learning tasks. Recent works have shown that QML models can effectively generalize from limited training data samples. This ...

research-article
Open Access
TPU as Cryptographic Accelerator

Cryptographic schemes like Fully Homomorphic Encryption (FHE) and Zero-Knowledge Proofs (ZKPs), while offering powerful privacy-preserving capabilities, are often hindered by their computational complexity. Polynomial multiplication, a core operation in ...

research-article
Open Access
Short Paper: Analysis of Vivado implementation strategies regarding side-channel leakage for FPGA-based AES implementations

Dynamic restructuring of cryptographic implementations has been proposed as a viable countermeasure against power and electro-magnetic-based Side Channel Attacks (SCA). These kind of countermeasures involve shuffling between functionally identical but ...

research-article
Open Access
Cryptographic Memory Tagging: Towards Stateless Integrity

Memory safety violations like simple buffer overflows, or use-after-free are still prevalent issues in modern computing. One way of precluding them is to impose some lightweight form of access control via memory tagging. However, a straightforward ...

Index Terms

  1. Proceedings of the International Workshop on Hardware and Architectural Support for Security and Privacy 2024
    Index terms have been assigned to the content through auto-classification.
    Please enable JavaScript to view thecomments powered by Disqus.

    Recommendations

    Acceptance Rates

    Overall Acceptance Rate 9 of 13 submissions, 69%
    YearSubmittedAcceptedRate
    HASP '1313969%
    Overall13969%