Author's Latest Posts


Side-Channel Security Analysis of Intel Optane Persistent Memory


A new technical paper titled "Side-Channel Attacks on Optane Persistent Memory" was published by researchers at University of Virginia, Cornell University, and Graz University of Technology. This paper was included at the recent 32nd USENIX Security Symposium. Abstract: "There is a constant evolution of technology for cloud environments, including the development of new memory storage tech... » read more

Modeling and Testing Microarchitectural Leakage of CPU Exceptions (Microsoft, Vrije Universiteit Amsterdam)


A new technical paper titled "Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions" was published by researchers at Microsoft and Vrije Universiteit Amsterdam. This paper was included at the recent 32nd USENIX Security Symposium. Abstract: "Microarchitectural leakage models provide effective tools to prevent vulnerabilities such as Spectre and Meltdown vi... » read more

Microarchitectural Side-Channel Attacks And Defenses on NVRAM DIMMs


A new technical paper titled "NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems" was published by researchers at UC San Diego, Purdue University, and UT Austin. This paper was included at the recent 32nd USENIX Security Symposium. Abstract: "We study microarchitectural side-channel attacks and defenses on non-volatile RAM (NVRAM) DIMMs. In this study, we first perform r... » read more

Physical Removal Attack On LiDAR Sensors And Mitigation Strategies


A technical paper titled "You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks" was published by researchers at University of Michigan, University of Florida and the University of Electro-Communications (Japan). This paper was included at the recent 32nd USENIX Security Symposium. Abstract: "Autonomous Vehicles (AVs) increasingly use LiDAR-base... » read more

Formal Processor Model Providing Provably Secure Speculation For The Constant-Time Policy


A new technical paper titled "ProSpeCT: Provably Secure Speculation for the Constant-Time Policy" was published by researchers at imec-DistriNet, KU Leuven, CEA, and INRIA. This paper was included at the recent 32nd USENIX Security Symposium. Abstract: "We propose ProSpeCT, a generic formal processor model providing provably secure speculation for the constant-time policy. For constant-tim... » read more

Remote Direct Memory Introspection (Rice, Duke, MIT)


A technical paper titled "Remote Direct Memory Introspection" was published by researchers at Rice University, Duke University, and MIT. This paper won a distinguished paper award at the recent 32nd USENIX Security Symposium. Abstract: "Hypervisors have played a critical role in cloud security, but they introduce a large trusted computing base (TCB) and incur a heavy performance tax. As of... » read more

EDA Tool To Detect SW-HW Vulnerabilities Ensuring Data Confidentiality In A RISC-V Architecture


A technical paper titled “SoftFlow: Automated HW-SW Confidentiality Verification for Embedded Processors” was published by researchers at RWTH Aachen University, Robert Bosch, and Newcastle University. Abstract: "Despite its ever-increasing impact, security is not considered as a design objective in commercial electronic design automation (EDA) tools. This results in vulnerabilities being... » read more

A Chiplet-Based Fully Homomorphic Encryption Accelerator


A technical paper titled “CiFHER: A Chiplet-Based FHE Accelerator with a Resizable Structure” was published by researchers at Seoul National University. Abstract: "Fully homomorphic encryption (FHE) is in the spotlight as a definitive solution for privacy, but the high computational overhead of FHE poses a challenge to its practical adoption. Although prior studies have attempted to desig... » read more

Anode Interlayers To Reduce Interfacial Resistance Of Solid-State Li-Metal Batteries And Prevent Short-Circuit Formation


A technical paper titled “Design Strategies for Anodes and Interfaces Toward Practical Solid-State Li-Metal Batteries” was published by researchers at Samsung Advanced Institute of Technology. Abstract: "Solid-state Li-metal batteries (based on solid-state electrolytes) offer excellent safety and exhibit high potential to overcome the energy-density limitations of current Li-ion batteries... » read more

A Novel Optically Triggered Self-Adaptive ZVS Method For SiC MOSFETs 


A technical paper titled “Optically Triggered Self-Adaptive Zero Voltage Switching” was published by researchers at University of Cambridge, Zhejiang University, and Swiss Federal Institute of Technology. Abstract: "Zero voltage switching (ZVS) is useful to increase power electronics efficiency but difficult to achieve due to the nonlinear parasitic capacitance of the power semiconducto... » read more

← Older posts Newer posts →