Title | Author |
A2: Analog Malicious Hardware | Kaiyuan Yang |
Aker: A Design and Verification Framework for Safe and Secure SoC Access Control | Andy Meza |
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild | Adam Morrison |
CaSA: End-to-end Quantitative Security Analysis of Randomly Mapped Caches | Yuheng Yang |
FPGA-Based Remote Power Side-Channel Attacks | Mark Zhao |
Keystone: An Open Framework for Architecting Trusted Execution Environments | David Kohlbrenner |
Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis | Shivam Bhasin |
Microarchitectural Attack Synthesis with Happens-Before Analysis | Caroline Trippel |
No-FAT: Architectural Support for Low Overhead Memory Safety Checks | Miguel Arroyo |
Stealthy Tracking of Autonomous Vehicles with Cache Side Channels | Mulong Luo |