Search Results - "Social and professional topics Computing technology policy Computer crime"
-
1
Security analysis of logic obfuscation
ISBN: 1450311997, 9781450311991ISSN: 0738-100XPublished: New York, NY, USA ACM 03.06.2012Published in DAC Design Automation Conference 2012 (03.06.2012)“…Due to globalization of Integrated Circuit (IC) design flow, rogue elements in the supply chain can pirate ICs, overbuild ICs, and insert hardware trojans…”
Get full text
Conference Proceeding -
2
Smart Contract Security: A Practitioners' Perspective
ISBN: 1665402962, 9781665402965ISSN: 1558-1225Published: IEEE 01.05.2021Published in Proceedings / International Conference on Software Engineering (01.05.2021)“…Smart contracts have been plagued by security incidents, which resulted in substantial financial losses. Given numerous research efforts in addressing the…”
Get full text
Conference Proceeding -
3
New Attacks and Defense for Encrypted-Address Cache
ISSN: 2575-713XPublished: ACM 01.06.2019Published in 2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA) (01.06.2019)“…Conflict-based cache attacks can allow an adversary to infer the access pattern of a co-running application by orchestrating evictions via cache conflicts…”
Get full text
Conference Proceeding -
4
TyTAN: Tiny trust anchor for tiny devices
ISSN: 0738-100XPublished: IEEE 01.06.2015Published in Proceedings - ACM IEEE Design Automation Conference (01.06.2015)“…Embedded systems are at the core of many security-sensitive and safety-critical applications, including automotive, industrial control systems, and critical…”
Get full text
Conference Proceeding -
5
Containing Malicious Package Updates in npm with a Lightweight Permission System
ISBN: 1665402962, 9781665402965ISSN: 1558-1225Published: IEEE 01.05.2021Published in Proceedings / International Conference on Software Engineering (01.05.2021)“…The large amount of third-party packages available in fast-moving software ecosystems, such as Node.js/npm, enables attackers to compromise applications by…”
Get full text
Conference Proceeding -
6
AVFSM: A framework for identifying and mitigating vulnerabilities in FSMs
Published: IEEE 05.06.2016Published in 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC) (05.06.2016)“…A finite state machine (FSM) is responsible for controlling the overall functionality of most digital systems and, therefore, the security of the whole system…”
Get full text
Conference Proceeding -
7
The state-of-the-art in semiconductor reverse engineering
ISBN: 1450306365, 9781450306362ISSN: 0738-100XPublished: New York, NY, USA ACM 05.06.2011Published in 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC) (05.06.2011)“…This presentation gives an overview of the place of reverse engineering (RE) in the semiconductor industry, and the techniques used to obtain information from…”
Get full text
Conference Proceeding -
8
Detecting malicious modifications of data in third-party intellectual property cores
ISSN: 0738-100XPublished: IEEE 07.06.2015Published in Proceedings - ACM IEEE Design Automation Conference (07.06.2015)“…Globalization of the system-on-chip (SoC) design flow has created opportunities for rogue elements in the intellectual property (IP) vendor companies to insert…”
Get full text
Conference Proceeding -
9
Fort-NoCs: Mitigating the threat of a compromised NoC
ISSN: 0738-100XPublished: IEEE 01.06.2014Published in Proceedings - ACM IEEE Design Automation Conference (01.06.2014)“…In this paper, we uncover a novel and imminent threat to an emerging computing paradigm: MPSoCs built with 3rd party IP NoCs. We demonstrate that a compromised…”
Get full text
Conference Proceeding -
10
Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
ISSN: 1558-2434Published: ACM 01.11.2018Published in 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (01.11.2018)“…The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used…”
Get full text
Conference Proceeding -
11
A Passion for Security: Intervening to Help Software Developers
ISBN: 9781665438698, 166543869XPublished: IEEE 01.05.2021Published in 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP) (01.05.2021)“…While the techniques to achieve secure, privacy-preserving software are now well understood, evidence shows that many software development teams do not use…”
Get full text
Conference Proceeding -
12
Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation
ISSN: 2643-1572Published: IEEE 01.11.2021Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (01.11.2021)“…The need for cyber resilience is increasingly important in our technology-dependent society, where computing systems, devices and data will continue to be the…”
Get full text
Conference Proceeding -
13
Leaky Way: A Conflict-Based Cache Covert Channel Bypassing Set Associativity
Published: IEEE 01.10.2022Published in 2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO) (01.10.2022)“…Modern \times86 processors feature many prefetch instructions that developers can use to enhance performance. However, with some prefetch instructions, users…”
Get full text
Conference Proceeding -
14
Efficient Detection of Toxic Prompts in Large Language Models
ISSN: 2643-1572Published: ACM 27.10.2024Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…Large language models (LLMs) like ChatGPT and Gemini have significantly advanced natural language processing, enabling various applications such as chatbots…”
Get full text
Conference Proceeding -
15
Evaluating the Security of eFPGA-based Redaction Algorithms
ISSN: 1558-2434Published: ACM 29.10.2022Published in 2022 IEEE/ACM International Conference On Computer Aided Design (ICCAD) (29.10.2022)“…Hardware IP owners must envision procedures to avoid piracy and overproduction of their designs under a fabless paradigm. A newly proposed technique to…”
Get full text
Conference Proceeding -
16
DIALED: Data Integrity Attestation for Low-end Embedded Devices
Published: IEEE 05.12.2021Published in 2021 58th ACM/IEEE Design Automation Conference (DAC) (05.12.2021)“…Verifying integrity of software execution in low-end microcontroller units (MCUs) is a well-known open problem. The central challenge is how to securely detect…”
Get full text
Conference Proceeding -
17
Accounting for Missing Events in Statistical Information Leakage Analysis
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…The leakage of secret information via a public channel is a critical privacy flaw in software systems. The more information is leaked per observation, the less…”
Get full text
Conference Proceeding -
18
SCONE: A Logic Locking Technique Utilizing SMT Solver and Circuit Encoding Scheme for Efficient Hardware IP Protection
Published: IEEE 22.06.2025Published in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…Multiple intellectual property (IP) protections have emerged to defeat security threats in integrated circuit (IC) supply chain. Among these, logic locking is…”
Get full text
Conference Proceeding -
19
Query-Based Black-Box Stealthy Sensor Attacks on Cyber-Physical Systems
Published: IEEE 22.06.2025Published in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…We study the vulnerability of Cyber-physical systems (CPS) under stealthy sensor attacks in black-box scenarios. "Black-box" refers to scenarios where the…”
Get full text
Conference Proceeding -
20
PUFatt: Embedded platform attestation based on novel processor-based PUFs
ISSN: 0738-100XPublished: IEEE 01.06.2014Published in Proceedings - ACM IEEE Design Automation Conference (01.06.2014)“…Software-based attestation schemes aim at proving the integrity of code and data residing on a platform to a verifying party. However, they do not bind the…”
Get full text
Conference Proceeding

