


default search action
HOST 2025: San Jose, CA, USA
- IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2025, San Jose, CA, USA, May 5-8, 2025. IEEE 2025, ISBN 979-8-3315-4198-9
- Le Wu, Liji Wu, Zhiwei Ba, Xiangmin Zhang:
An Input Recovery Side-Channel Attack on Dnn Accelerator with Three-Dimensional Power Surface. 1-11 - Ruyi Ding, Cheng Gongye, Davis Ranney, Aidong Adam Ding, Yunsi Fei:
MACPruning: Dynamic Operation Pruning to Mitigate Side-Channel DNN Model Extraction. 12-22 - Nina Shamsi, Yan Long, Kevin Fu:
Eyehearyou: Probing Location Identification Via Occluded Smartphone Cameras and Ultrasound. 23-34 - Hugo Perrin, Jean-Max Dutertre, Jean-Baptiste Rigaud:
Betrayed by Light: How Photon Emission Microscopy Empowers Register Bit-Level Laser Attacks on Microcontrollers. 35-45 - Amit Mazumder Shuvo, Md Latifur Rahman, Jingbo Zhou, Farimah Farahmandi, Mark M. Tehranipoor:
ReFID: A System-Aware Remote Fault-Injection Attack Detection & Mitigation for Secure Heterogeneous System. 46-56 - Pantha Protim Sarker, Tianze Kan, Jingchen Liang, Ozgur Tuncer, Bo He, Zelin Lu, Sudarshan Mallu, Lang Lin, Norman Chang, Rikuu Hasegawa, Kazuki Monta, Makoto Nagata, Farimah Farahmandi, Mark M. Tehranipoor:
ML-EMFI: A Machine Learning-Driven Pre-Silicon Electromagnetic Fault Injection Security Evaluation for Robust IC Design. 57-66 - Yuntao Liu, Jayden John, Qian Wang:
E-LoQ: Enhanced Locking for Quantum Circuit IP Protection. 67-77 - Satwik Kundu, Swaroop Ghosh:
STIQ: Safeguarding Training and Inferencing of Quantum Neural Networks from Untrusted Cloud. 78-87 - Donald Lushi, Samah Mohamed Saeed:
Undermining Quantum Circuit Obfuscation: Insights from Structural Analysis. 88-98 - Muhammad Ahsan, Barry Najarro-Blancas, Johanna Tsala Ebode, Nastassja Lewinski, Irfan Ahmed:
3D Bioprinter Firmware Attacks: Categorization, Implementation, and Impacts. 99-110 - Ryan Piersma, Tawhid Bhuiyan, Tanvir Ahmed Khan, Simha Sethumadhavan:
Reverse Engineering DVFS Mechanisms. 111-122 - Sisheng Liang, Zhengxiong Li, Zihao Zhan, Zhenkai Zhang:
FanBleed: Stealing Your Secrets via Observing Your Cooling Fan. 123-134 - Davis Ranney, Yufei Wang, A. Adam Ding, Yunsi Fei:
USBSnoop - Revealing Device Activities via USB Congestions. 135-145 - Hansika Weerasena, Prabhat Mishra:
Traffic Analysis Attacks on Wireless NoC-Based SoCs. 146-156 - Donayam Benti, Todd M. Austin:
DOME: Automated Validation of Data-Oblivious Program Execution. 157-169 - Nehal A. Mansour, Ramyapandian Vijayakanthan, Adeen Ayub, Aisha I. Ali-Gombe, Irfan Ahmed:
WaveSleuth: Retrospective PLC Memory for Anomaly Detection in Industrial Control Systems. 170-181 - Muhammad Shakeel Akram, Vincent Meyers, Mehdi B. Tahoori, Bogaraju Sharatchandra Varma, Dewar Finlay:
EvoWeight: Sponge Poisoning of FPGA-Based DNN Accelerators in Differential Private Secure Federated Learning. 182-193 - Alexander Cathis, Mulong Luo, Mohit Tiwari, Andreas Gerstlauer:
LAPD: Lifecycle-Aware Power-Based Malware Detection. 194-204 - Robi Paul, Michael Zuzak:
Michscan: Black-Box Neural Network Integrity Checking at Runtime Through Power Analysis. 205-215 - Xiang Zhang, Ziyue Zhang, Aidong Adam Ding, Yunsi Fei:
AccessShadow: Leveraging Adversarial Samples to Counter Deep Learning-Assisted Cache Timing Attacks. 216-226 - Spyridon Raptis, Paul Kling, Ioannis Kaskampas, Ihsen Alouani, Haralampos-G. Stratigopoulos:
Input-Triggered Hardware Trojan Attack on Spiking Neural Networks. 227-238 - Dipali Jain, Shakil Ahmed, Guangwei Zhao, Rajesh Datta, Kaveh Shamsi:
Trojan Localization in Generic AMS Circuits from Combined Power and Functional Queries. 239-249 - Ruochen Dai, Zhaoxiang Liu, Orlando Arias, Xiaolong Guo, Tuba Yavuz:
Evaluating the Effectiveness of Hardware Trojan Detection Approaches at RTL. 250-260 - Hayato Ide, Shohei Matsumoto, Taiki Kitazawa, Shugo Kaji, Daisuke Fujimoto, Takashi Kasuga, Yuichi Hayashi:
Amplifying Electromagnetic Leakage by Hardware Trojans Through Cable Geometry Manipulation. 261-267 - Md. Sadman Siraj, Aisha B. Rahman, Cyrus Minwalla, Eirini Eleni Tsiropoulou, Jim Plusquellic:
Sourcing Trust From Peers with Physical Unclonable Functions. 268-278 - Florian Pebay-Peyroula, Licinius-Pompiliu Benea, Mikael Carmona, Romain Wacquez:
On the Impact of Metastability in Jitter Based TRNG. 279-288 - Jens Nöpel, Tim Music, Niklas Stein, Christoph Frisch, Michael Pehl:
Quantization Schemes for PUFs: The Entropy-Area Trade-Off. 289-299 - Andrew Gan, Setsuna Yuki, Timothy Rogers, Zahra Ghodsi:
Cuot: Accelerating Oblivious Transfer on Gpus for Privacy-Preserving Computation. 300-311 - Martin Unterguggenberger, David Schrammel, Lukas Maar, Lukas Lamster, Vedad Hadzic, Stefan Mangard:
Cryptographic Least Privilege Enforcement for Scalable Memory Isolation. 312-323 - Rostin Shokri, Nektarios Georgios Tsoutsos:
CHESS: Compiling Homomorphic Encryption with Scheme Switching. 324-334 - Shams Tarek, Dipayan Saha, Sujan Kumar Saha, Mark M. Tehranipoor, Farimah Farahmandi:
SoCureLLM: An LLM-Driven Approach for Large-Scale System-on-Chip Security Verification and Policy Generation. 335-345 - Erika A. Leal, Mengfei Ren, Shijia Li, Jiang Ming:
Low-Entropy Packed Binary Detection via Accurate Hardware Events Profiling. 346-357 - Raphael Götz, Christoph Sendner, Nico Ruck, Mohamadreza Rostami, Alexandra Dmitrienko, Ahmad-Reza Sadeghi:
RLFuzz: Accelerating Hardware Fuzzing with Deep Reinforcement Learning. 358-369 - Sulyab Thottungal Valapu, Aritri Saha, Bhaskar Krishnamachari, Vivek V. Menon, Ujjwal Guin:
Reward-Based Blockchain Infrastructure for 3D Ic Supply Chain Provenance. 370-380 - Prathamesh Nitin Tanksale, Guru Raghava S. Seethiraju, Shirshendu Das, Venkata Kalyan Tavva:
$\mathcal{RRR}$: Rethinking Randomized Remapping for High Performance Secured NVM LLC. 381-391 - Merve Karabulut, Reza Azarderakhsh:
Efficient Cpa Attack on Hardware Implementation of Ml-Dsa in Post-Quantum Root of Trust. 392-402 - Théophile Gousselot, Jean-Max Dutertre, Olivier Potin, Jean-Baptiste Rigaud:
Code Encryption for Confidentiality and Execution Integrity Down to Control Signals. 403-414 - Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, Carl A. Gunter:
Termite Attacks: Gnawing on Logs to Extract Secret Information. 415-426 - Bethanie Williams, Rima Asmar Awad, Clifton J. Mulkey, Gabriela F. Ciocarlie, Muhammad Ismail, Kyle Saleeby:
Securing Smart Manufacturing: Detection of Cyber-Physical Attacks in CNC-Based Systems. 428-438 - Muhammad Ahsan, Irfan Ahmed:
Wattshield: A Power Side-Channel Framework for Detecting Malicious Firmware in Fused Filament Fabrication. 438-449 - Paul Krüger, Stefan Wildermann, Jürgen Teich:
Breaking Confidentiality of XTS-AES Encrypted Data at Rest on Microprocessors Using Electromagnetic Side-Channel Attacks. 450-461 - Logan Reichling, Ryan Evans, Mabon Ninan, Phuc Mai, Boyang Wang, Yunsi Fei, John Marty Emmert:
Micropower: Micro Neural Networks for Side-Channel Attacks. 462-473

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.