default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 184 matches
- 2024
- Miguel Antonio Caraveo-Cacep, Rubén Vázquez-Medina, Antonio Hernández Zavala:
A review on security implementations in soft-processors for IoT applications. Comput. Secur. 139: 103677 (2024) - Aobo Li, Jiahao Lu, Dongsheng Liu, Xiang Li:
A 40nm 1.26µ/Op Energy-Efficient CRYSTALS-KYBER Post-Quantum Crypto-Processor with Comprehensive Side Channel Security Analysis and Countermeasures. CICC 2024: 1-2 - Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay:
Shesha : Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors. USENIX Security Symposium 2024 - Pallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran:
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors. USENIX Security Symposium 2024 - 2023
- Noura Ait Manssour:
Hardware Security of Embedded Processors against Fault Injection Attacks. (Sécurisation matérielle de processeurs embarqués face aux attaques par injection de fautes). University of Southern Brittany, Vannes, Morbihan, France, 2023 - Mohammad Ahmed Alomari, Hazleen Aris, Mukhtar Ghaleb, Yahya Almurtadha, Gamal Abdulnaser Alkawsi, Ismail Ahmad Al-Qasem Al-Hadi, Yahia Baashar, Khairulmizam Samsudin:
Embedded Devices Security: Design and Implementation of a Light RDBMS Encryption Utilizing Multi-Core Processors. IEEE Access 11: 19836-19848 (2023) - Tao Hai, Jincheng Zhou, Dayang N. A. Jawawi, Dan Wang, Uzoma I. Oduah, Cresantus Biamba, Sanjiv Kumar Jain:
Task scheduling in cloud environment: optimization, security prioritization and processor selection schemes. J. Cloud Comput. 12(1): 15 (2023) - Guang Chen, Binglong Li:
Design and Implementation of High-speed Reconfigurable Multi-core Network Security Protocol Analyse Processor. ASICON 2023: 1-4 - Zilong Wang, Gideon Mohr, Klaus von Gleissenthall, Jan Reineke, Marco Guarnieri:
Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts. CCS 2023: 2128-2142 - Jens Anders, Pablo Andreu, Bernd Becker, Steffen Becker, Riccardo Cantoro, Nikolaos Ioannis Deligiannis, Nourhan Elhamawy, Tobias Faller, Carles Hernández, Nele Mentens, Mahnaz Namazi Rizi, Ilia Polian, Abolfazl Sajadi, Matthias Sauer, Denis Schwachhofer, Matteo Sonza Reorda, Todor Stefanov, Ilya Tuzov, Stefan Wagner, Nusa Zidaric:
A Survey of Recent Developments in Testability, Safety and Security of RISC-V Processors. ETS 2023: 1-10 - Ning Dong, Roberto Guanciale, Mads Dam, Andreas Lööw:
Formal Verification of Correctness and Information Flow Security for an In-Order Pipelined Processor. FMCAD 2023: 247-256 - Czea Sie Chuah, Christian Appold, Tim Leinmüller:
Formal Verification of Security Properties on RISC-V Processors. MEMOCODE 2023: 159-168 - Eslam Abdel Bary, Mohamed A. Sharaf, Ahmed Hussein, Amin M. Nassar, Hassan Mostafa:
Efficient ASIC Implementation for Satellite-IoT Security Co-processor. MOCAST 2023: 1-4 - Chen Chen, Rahul Kande, Nathan Nguyen, Flemming Andersen, Aakash Tyagi, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran:
HyPFuzz: Formal-Assisted Processor Fuzzing. USENIX Security Symposium 2023: 1361-1378 - Jinyan Xu, Yiyuan Liu, Sirui He, Haoran Lin, Yajin Zhou, Cong Wang:
MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation. USENIX Security Symposium 2023: 1307-1324 - Zilong Wang, Gideon Mohr, Klaus von Gleissenthall, Jan Reineke, Marco Guarnieri:
Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts. CoRR abs/2305.06979 (2023) - 2022
- Jared Nye, Omer Khan:
SSE: Security Service Engines to Accelerate Enclave Performance in Secure Multicore Processors. IEEE Comput. Archit. Lett. 21(2): 129-132 (2022) - Kerem Arikan, Alessandro Palumbo, Luca Cassano, Pedro Reviriego, Salvatore Pontarelli, Giuseppe Bianchi, Oguz Ergin, Marco Ottavi:
Processor Security: Detecting Microarchitectural Attacks via Count-Min Sketches. IEEE Trans. Very Large Scale Integr. Syst. 30(7): 938-951 (2022) - Shuwen Deng, Bowen Huang, Jakub Szefer:
Leaky Frontends: Security Vulnerabilities in Processor Frontends. HPCA 2022: 53-66 - Krishnendu Guha, Sangeet Saha, Klaus D. McDonald-Maier:
SENAS: Security driven ENergy Aware Scheduler for Real Time Approximate Computing Tasks on Multi-Processor Systems. IOLTS 2022: 1-5 - Joppe W. Bos, Joost Renes, Christine van Vredendaal:
Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer. USENIX Security Symposium 2022: 3683-3697 - Rahul Kande, Addison Crump, Garrett Persyn, Patrick Jauernig, Ahmad-Reza Sadeghi, Aakash Tyagi, Jeyavijayan Rajendran:
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities. USENIX Security Symposium 2022: 3219-3236 - Mohammadkazem Taram, Xida Ren, Ashish Venkat, Dean M. Tullsen:
SecSMT: Securing SMT Processors against Contention-Based Covert Channels. USENIX Security Symposium 2022: 3165-3182 - Utsav Banerjee, Anantha P. Chandrakasan:
A Low-Power BLS12-381 Pairing Crypto-Processor for Internet-of-Things Security Applications. CoRR abs/2201.07496 (2022) - 2021
- Rui Zhang, Calvin Deutschbein, Peng Huang, Cynthia Sturton:
End-to-End Automated Exploit Generation for Processor Security Validation. IEEE Des. Test 38(3): 22-30 (2021) - Mohamed H. Abdulmonem, Ahmed K. Ismail, Hassan Mostafa:
Design and Implementation of Authenticated Encryption Co-Processors for Satellite Hardware Security. ICM 2021: 40-44 - Dominik Meyer, Jan Haase, Marcel Eckert, Bernd Klauer:
A Modern Approach to Application Specific Processors for Improving the Security of Embedded Devices. IECON 2021: 1-6 - Joonsung Kim, Hamin Jang, Hunjun Lee, Seungho Lee, Jangwoo Kim:
UC-Check: Characterizing Micro-operation Caches in x86 Processors and Implications in Security and Performance. MICRO 2021: 550-564 - Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, Russell Tessier:
On the Design and Misuse of Microcoded (Embedded) Processors - A Cautionary Note. USENIX Security Symposium 2021: 267-284 - Paizhuo Chen, Lei Li, Zhice Yang:
Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle Power Management. USENIX Security Symposium 2021: 733-750
skipping 154 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-24 15:48 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint