Search Results - "Social and professional topics Computing technology policy Computer crime"

Refine Results
  1. 1

    Security analysis of logic obfuscation by Rajendran, Jeyavijayan, Pino, Youngok, Sinanoglu, Ozgur, Karri, Ramesh

    ISBN: 1450311997, 9781450311991
    ISSN: 0738-100X
    Published: New York, NY, USA ACM 03.06.2012
    Published in DAC Design Automation Conference 2012 (03.06.2012)
    “…Due to globalization of Integrated Circuit (IC) design flow, rogue elements in the supply chain can pirate ICs, overbuild ICs, and insert hardware trojans…”
    Get full text
    Conference Proceeding
  2. 2

    Smart Contract Security: A Practitioners' Perspective by Wan, Zhiyuan, Xia, Xin, Lo, David, Chen, Jiachi, Luo, Xiapu, Yang, Xiaohu

    ISBN: 1665402962, 9781665402965
    ISSN: 1558-1225
    Published: IEEE 01.05.2021
    “…Smart contracts have been plagued by security incidents, which resulted in substantial financial losses. Given numerous research efforts in addressing the…”
    Get full text
    Conference Proceeding
  3. 3

    New Attacks and Defense for Encrypted-Address Cache by Qureshi, Moinuddin K.

    ISSN: 2575-713X
    Published: ACM 01.06.2019
    “…Conflict-based cache attacks can allow an adversary to infer the access pattern of a co-running application by orchestrating evictions via cache conflicts…”
    Get full text
    Conference Proceeding
  4. 4

    TyTAN: Tiny trust anchor for tiny devices by Brasser, Ferdinand, El Mahjoub, Brahim, Sadeghi, Ahmad-Reza, Wachsmann, Christian, Koeberl, Patrick

    ISSN: 0738-100X
    Published: IEEE 01.06.2015
    “…Embedded systems are at the core of many security-sensitive and safety-critical applications, including automotive, industrial control systems, and critical…”
    Get full text
    Conference Proceeding
  5. 5

    Containing Malicious Package Updates in npm with a Lightweight Permission System by Ferreira, Gabriel, Jia, Limin, Sunshine, Joshua, Kastner, Christian

    ISBN: 1665402962, 9781665402965
    ISSN: 1558-1225
    Published: IEEE 01.05.2021
    “…The large amount of third-party packages available in fast-moving software ecosystems, such as Node.js/npm, enables attackers to compromise applications by…”
    Get full text
    Conference Proceeding
  6. 6

    AVFSM: A framework for identifying and mitigating vulnerabilities in FSMs by Nahiyan, Adib, Kan Xiao, Kun Yang, Yier Jin, Forte, Domenic, Tehranipoor, Mark

    Published: IEEE 05.06.2016
    “…A finite state machine (FSM) is responsible for controlling the overall functionality of most digital systems and, therefore, the security of the whole system…”
    Get full text
    Conference Proceeding
  7. 7

    The state-of-the-art in semiconductor reverse engineering by Torrance, Randy, James, Dick

    ISBN: 1450306365, 9781450306362
    ISSN: 0738-100X
    Published: New York, NY, USA ACM 05.06.2011
    “…This presentation gives an overview of the place of reverse engineering (RE) in the semiconductor industry, and the techniques used to obtain information from…”
    Get full text
    Conference Proceeding
  8. 8

    Detecting malicious modifications of data in third-party intellectual property cores by Rajendran, Jeyavijayan, Vedula, Vivekananda, Karri, Ramesh

    ISSN: 0738-100X
    Published: IEEE 07.06.2015
    “…Globalization of the system-on-chip (SoC) design flow has created opportunities for rogue elements in the intellectual property (IP) vendor companies to insert…”
    Get full text
    Conference Proceeding
  9. 9

    Fort-NoCs: Mitigating the threat of a compromised NoC by Ancajas, Dean Michael, Chakraborty, Koushik, Roy, Sanghamitra

    ISSN: 0738-100X
    Published: IEEE 01.06.2014
    “…In this paper, we uncover a novel and imminent threat to an emerging computing paradigm: MPSoCs built with 3rd party IP NoCs. We demonstrate that a compromised…”
    Get full text
    Conference Proceeding
  10. 10

    Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level by Schellenberg, Falk, Gnad, Dennis R.E., Moradi, Amir, Tahoori, Mehdi B.

    ISSN: 1558-2434
    Published: ACM 01.11.2018
    “…The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used…”
    Get full text
    Conference Proceeding
  11. 11

    A Passion for Security: Intervening to Help Software Developers by Weir, Charles, Becker, Ingolf, Blair, Lynne

    ISBN: 9781665438698, 166543869X
    Published: IEEE 01.05.2021
    “…While the techniques to achieve secure, privacy-preserving software are now well understood, evidence shows that many software development teams do not use…”
    Get full text
    Conference Proceeding
  12. 12

    Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation by Nguyen, Tien N., Choo, Raymond

    ISSN: 2643-1572
    Published: IEEE 01.11.2021
    “…The need for cyber resilience is increasingly important in our technology-dependent society, where computing systems, devices and data will continue to be the…”
    Get full text
    Conference Proceeding
  13. 13

    Leaky Way: A Conflict-Based Cache Covert Channel Bypassing Set Associativity by Guo, Yanan, Xin, Xin, Zhang, Youtao, Yang, Jun

    Published: IEEE 01.10.2022
    “…Modern \times86 processors feature many prefetch instructions that developers can use to enhance performance. However, with some prefetch instructions, users…”
    Get full text
    Conference Proceeding
  14. 14

    Efficient Detection of Toxic Prompts in Large Language Models by Liu, Yi, Yu, Junzhe, Sun, Huijia, Shi, Ling, Deng, Gelei, Chen, Yuqi, Liu, Yang

    ISSN: 2643-1572
    Published: ACM 27.10.2024
    “…Large language models (LLMs) like ChatGPT and Gemini have significantly advanced natural language processing, enabling various applications such as chatbots…”
    Get full text
    Conference Proceeding
  15. 15

    Evaluating the Security of eFPGA-based Redaction Algorithms by Rezaei, Amin, Afsharmazayejani, Raheel, Maynard, Jordan

    ISSN: 1558-2434
    Published: ACM 29.10.2022
    “…Hardware IP owners must envision procedures to avoid piracy and overproduction of their designs under a fabless paradigm. A newly proposed technique to…”
    Get full text
    Conference Proceeding
  16. 16

    DIALED: Data Integrity Attestation for Low-end Embedded Devices by De Oliveira Nunes, Ivan, Jakkamsetti, Sashidhar, Tsudik, Gene

    Published: IEEE 05.12.2021
    “…Verifying integrity of software execution in low-end microcontroller units (MCUs) is a well-known open problem. The central challenge is how to securely detect…”
    Get full text
    Conference Proceeding
  17. 17

    Accounting for Missing Events in Statistical Information Leakage Analysis by Lee, Seongmin, Minocha, Shreyas, Bohme, Marcel

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…The leakage of secret information via a public channel is a critical privacy flaw in software systems. The more information is leaked per observation, the less…”
    Get full text
    Conference Proceeding
  18. 18

    SCONE: A Logic Locking Technique Utilizing SMT Solver and Circuit Encoding Scheme for Efficient Hardware IP Protection by Han, Zhaokun, Xing, Daniel, Amberiadis, Kostas, Srivastava, Ankur, Rajendran, Jeyavijayan Jv

    Published: IEEE 22.06.2025
    “…Multiple intellectual property (IP) protections have emerged to defeat security threats in integrated circuit (IC) supply chain. Among these, logic locking is…”
    Get full text
    Conference Proceeding
  19. 19

    Query-Based Black-Box Stealthy Sensor Attacks on Cyber-Physical Systems by Jiang, Shixiong, Xu, Weizhe, Liu, Mengyu, Kong, Fanxin

    Published: IEEE 22.06.2025
    “…We study the vulnerability of Cyber-physical systems (CPS) under stealthy sensor attacks in black-box scenarios. "Black-box" refers to scenarios where the…”
    Get full text
    Conference Proceeding
  20. 20

    PUFatt: Embedded platform attestation based on novel processor-based PUFs by Kong, Joonho, Koushanfar, Farinaz, Pendyala, Praveen K., Sadeghi, Ahmad-Reza, Wachsmann, Christian

    ISSN: 0738-100X
    Published: IEEE 01.06.2014
    “…Software-based attestation schemes aim at proving the integrity of code and data residing on a platform to a verifying party. However, they do not bind the…”
    Get full text
    Conference Proceeding