All Stories

  1. An Auto-profiling Side-Channel Attack against NTT Hardware Implementations
  2. SHAFI: Securing Hash-Based Post-Quantum Cryptography from Hardware Fault Injection Attacks
  3. Thena: Torus Fully Homomorphic Encryption on Energy-Efficient Heterogeneous Architecture
  4. Energy-Efficient Acceleration of Hash-Based Post-Quantum Cryptographic Schemes on Embedded Spatial Architectures
  5. DEMO: Radio Unit Activity Fingerprinting through Electromagnetic Side-Channel Analysis in O-RAN Networks
  6. ArKANe: Accelerating Kolmogorov-Arnold Networks on Reconfigurable Spatial Architectures
  7. SANTA: A Spatial Accelerator Design for Efficient Number Theoretic Transform (NTT) on Heterogeneous System-on-Chips
  8. Ising Model Processors on a Spatial Computing Architecture
  9. Poster: Address Resolution Protocol Based Attacks for Multi-Robot Systems
  10. An RRAM-Based Computing-in-Memory Architecture and Its Application in Accelerating Transformer Inference
  11. ADLPT: Improving 3D NAND Flash Memory Reliability by Adaptive Lifetime Prediction Techniques
  12. An Approximate Memory Based Defense Against Model Inversion Attacks to Neural Networks
  13. Voltage Over-Scaling-Based Lightweight Authentication for IoT Security
  14. Computation-in-Memory Accelerators for Secure Graph Database: Opportunities and Challenges
  15. Cyber Threat Analysis and Trustworthy Artificial Intelligence
  16. Attack Detection and Countermeasures for Autonomous Navigation
  17. Security of Neural Networks from Hardware Perspective
  18. RIME
  19. Hardware-Based Authentication Applications
  20. MIDAS: Model Inversion Defenses Using an Approximate Memory System
  21. Securing Industrial Control Systems Using Physical Device Fingerprinting
  22. FABLE-DTS: Hardware-Software Co-Design of a Fast and Stable Data Transmission System for FPGAs
  23. Security Challenges of Processing-In-Memory Systems
  24. LPN-based Device Authentication Using Resistive Memory
  25. Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks
  26. Memristors for Secret Sharing-Based Lightweight Authentication
  27. Memristor-Based Security
  28. A Low-Cost GPS Spoofing Detector Design for Internet of Things (IoT) Applications
  29. Hardware-based anti-counterfeiting techniques for safeguarding supply chain integrity
  30. VOLtA: Voltage over-scaling based lightweight authentication for IoT applications
  31. Approximate computing for low power and security in the Internet of Things
  32. Secret Sharing and Multi-user Authentication
  33. Detecting GNSS Spoofing using a Network of Hardware Oscillators
  34. RRAM based lightweight user authentication
  35. A survey on memristor modeling and security applications
  36. Exploring the electronic properties of relaxed bilayer nitrogen-graphene alloy using density functional theory
  37. Performance optimization for terahertz quantum cascade laser at higher temperature using genetic algorithm
  38. Approximation on Data Flow Graph Execution for Energy Efficiency
  39. Voltage Overscaling Techniques for Security Applications
  40. Engaging Underrepresented Students in Cybersecurity using Capture-the-Flag(CTF) Competitions (Experience)