Bit-slicing is a software implementation technique that treats an N-bit
...
Motivated by the rise of quantum computers, existing public-key cryptosy...
Recent research in micro-architectural attacks has uncovered a variety o...
State-of-the-art deep neural networks (DNNs) have been proven to be
vuln...
Several techniques have been proposed to detect vulnerable Spectre gadge...
The adversarial model presented by trusted execution environments (TEEs)...
After years of development, FPGAs are finally making an appearance on
mu...
Trusted Platform Module (TPM) serves as a hardware-based root of trust t...
The growing security threat of microarchitectural attacks underlines the...
Recently, out-of-order execution, an important performance optimization ...
The trend toward autonomous robot deployments is on an upward growth cur...
Modern microarchitectures incorporate optimization techniques such as
sp...
Over the past years, literature has shown that attacks exploiting the
mi...
Microarchitectural side channels expose unprotected software to informat...
Over the past decade, side-channels have proven to be significant and
pr...
Cache attacks exploit memory access patterns of cryptographic
implementa...