


default search action
SEED 2022: Storrs, CT, USA
- 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), Storrs, CT, USA, September 26-27, 2022. IEEE 2022, ISBN 978-1-6654-8526-5

- Yashika Verma, Biswabandan Panda

:
Avenger: Punishing the Cross-Core Last-Level Cache Attacker and Not the Victim by Isolating the Attacker. 1-12 - Thomas Unterluggauer, Austin Harris

, Scott Constable, Fangfei Liu, Carlos V. Rozas:
Chameleon Cache: Approximating Fully Associative Caches with Random Replacement to Prevent Contention-Based Cache Attacks. 13-24 - Minjun Wu, Stephen McCamant, Pen-Chung Yew

, Antonia Zhai:
PREDATOR: A Cache Side-Channel Attack Detector Based on Precise Event Monitoring. 25-36 - Tarunesh Verma, Achilleas Anastasopoulos, Todd M. Austin:

These Aren't The Caches You're Looking For: Stochastic Channels on Randomized Caches. 37-48 - Pavlos Aimoniotis

, Amund Bergland Kvalsvik, Magnus Själander
, Stefanos Kaxiras:
Data-Out Instruction-In (DOIN!): Leveraging Inclusive Caches to Attack Speculative Delay Schemes. 49-60 - Kaustubh Shivdikar, Gilbert Jonatan, Evelio Mora, Neal Livesay, Rashmi Agrawal, Ajay Joshi, José L. Abellán, John Kim, David R. Kaeli:

Accelerating Polynomial Multiplication for Homomorphic Encryption on GPUs. 61-72 - Lauren Biernacki

, Meron Zerihun Demissie
, Kidus Birkayehu Workneh, Fitsum Assamnew Andargie
, Todd M. Austin:
Sequestered Encryption: A Hardware Technique for Comprehensive Data Privacy. 73-84 - Alvin Oliver Glova, Yukai Yang, Yiyao Wan, Zhizhou Zhang

, George Michelogiannakis
, Jonathan Balkind, Timothy Sherwood
:
Establishing Cooperative Computation with Hardware Embassies. 85-96 - Kailash Gogineni, Preet Derasari

, Guru Venkataramani:
Foreseer: Efficiently Forecasting Malware Event Series with Long Short-Term Memory. 97-108 - Roberto Guanciale, Nicolae Paladi, Arash Vahidi:

SoK: Confidential Quartet - Comparison of Platforms for Virtualization-Based Confidential Computing. 109-120 - Ayaz Akram, Venkatesh Akella, Sean Peisert

, Jason Lowe-Power
:
SoK: Limitations of Confidential Computing via TEEs for High-Performance Compute Systems. 121-132 - Jiyong Yu

, Xinyang Ge, Trent Jaeger, Christopher W. Fletcher, Weidong Cui:
Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory. 133-144 - Jiuqin Zhou, Yuan Xiao, Radu Teodorescu, Yinqian Zhang:

ENCLYZER: Automated Analysis of Transient Data Leaks on Intel SGX. 145-156 - Derrick Greenspan

, Naveed Ul Mustafa
, Zoran Kolega, Mark A. Heinrich, Yan Solihin:
Improving the Security and Programmability of Persistent Memory Objects. 157-168 - Casey Nelson, Joseph Izraelevitz, R. Iris Bahar

, Tamara Silbergleit Lehman:
Eliminating Micro-Architectural Side-Channel Attacks using Near Memory Processing. 179-189 - Usman Ali

, Abdul Rasheed Sahni, Omer Khan:
Protecting On-Chip Data Access Against Timing-Based Side-Channel Attacks on Multicores. 190-201 - Jacob Abraham, Alan Ehret, Michel A. Kinsy:

A Compiler for Transparent Namespace-Based Access Control for the Zeno Architecture. 1-10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














