HASP Logo

Call for Papers

Important Dates

Organizers

Program Committee

Submission Information

Program


Past workshops:

HASP 2014
HASP 2013
HASP 2012

Hardware and Architectural Support for Security and Privacy (HASP) 2015

June 14, 2015 in Portland, OR, USA -- in conjunction with ISCA 2015

Workshop moved to Sunday June 14 morning session, to enable attendance at SGX tutorial on Sat., June 13

Workshop Program


8:30 - 8:35 Welcome Remarks
Session 1: Memory Safety and Code Reuse Attacks
8:35 - 9:00 Exploring the Performance Implications of Memory Safety Primitives in Many-core Processors Executing Multi-threaded Workloads
Masab Ahmad, Syed Kamran Haider, Farrukh Hijaz, Marten van Dijk and Omer Khan
PDF via ACM Digital Library
Presentation Slides
9:00 - 9:25 Towards a Practical Solution to Detect Code Reuse Attacks on ARM Mobile Devices
Yongje Lee, Ingoo Heo, Dongil Hwang, Kyungmin Kim and Yunheung Paek
PDF via ACM Digital Library
Presentation Slides
Session 2: Side-Channels and Information Leakage
9:25 - 9:50 Side-Channel Analysis of MAC-Keccak Hardware Implementations
Pei Luo, Yunsi Fei, A. Adam Ding, Xin Fang, David Kaeli and Miriam Leeser
PDF via ACM Digital Library
Presentation Slides
9:50 - 10:15 Can randomized mapping secure instruction caches from side-channel attacks?
Fangfei Liu, Hao Wu and Ruby B. Lee
PDF via ACM Digital Library
Presentation Slides
10:15 - 10:40 Covert Channels through Branch Predictors: A Feasibility Study
Dmitry Evtyushkin, Dmitry Ponomarev and Nael Abu-Ghazaleh
PDF via ACM Digital Library
Presentation Slides    Presentation ODP File
10:40 - 11:05 Support Vector Regression: Exploiting Machine Learning Techniques for Leakage Modeling
Dirmanto Jap, Marc Stottinger and Shivam Bhasin
PDF via ACM Digital Library
Presentation Slides
11:05 - 11:30 Coffee Break
Session 3: Short Papers
11:30 - 11:45 Hardware Overhead Analysis of Programmability in ARX Crypto Processing
Mohamed Aly and Kevin Skadron
PDF via ACM Digital Library
No Slides
11:45 - 12:00 Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack
Alexander De Trano, Naghmeh Karimi, Ramesh Karri, Rex Guo and Sylvain Guilley
PDF via ACM Digital Library
Presentation Slides
12:00 - 12:15 Predicting Program Phases and Defending Against Side-Channel Attacks using Hardware Performance Counters
Junaid Nomani and Jakub Szefer
PDF via ACM Digital Library
Presentation Slides
12:15 - 12:30 Performance Optimizations of Integrity Checking based on Merkle Trees
Salaheddine Ouaarab, Renaud Pacalet, Guillaume Duc and Jeremie Brunel
PDF via ACM Digital Library
No Slides
12:30 End of Workshop -- Lunch