Paper ID |
Paper Title |
2 | BadHMP: Backdoor Attack Against Human Motion Prediction |
7 | Fixbench-RTL: A Comprehensive Benchmark for Evaluating LLMs on RTL Debugging |
10 | Privacy-Preserving CNN Inference on FPGA Framework with High Throughput |
16 | Split+Prune: Constructing Minimal Eviction Set under the LRU Replacement Policy |
19 | Lock+Umonitor+Umwait: Exposing the Security Risk of Lock Instruction in Achieving the Transient Execution Attack without Timer |
20 | A Unified Hardware Accelerator for Paillier and ElGamal with Masking and Improved Randomized Montgomery Ladder |
23 | Rethinking LLM Safety on Edge Devices: Unearthing Hidden Vulnerabilities through Power Stress |
24 | Modeling Fault Propagation for Model-Based Diagnosis as a MaxSAT Problem |
29 | FPGA-Accelerated SPHINCS+: An Area-Optimized and High-Throughput Design |
31 | ARXPUF: A Modeling Attack Resilient Lightweight Strong PUF based on Add-Rotate-Xor |
38 | RejSCore: Rejection Sampling Core for Multivariate-based Public key Cryptography |
39 | DASH-T: A Lightweight Countermeasure Based on Dynamic Address Shuffling and Temporal-hiding for Kyber抯 PWM |
42 | Evaluating Proposed Countermeasures for Power Analysis of Ring Oscillator PUFs |
50 | A Portable and Hybrid Verification Framework Using C and UVM for Secure RISC-V SoCs |
51 | Flexible NTT Accelerator Design Framework for Scalable Lattice-Based Cryptosystems |
52 | PPA: Novel Page Prefetcher-Based Side-Channel Attacks |
Paper ID |
Paper Title |
6 | Leveraging Large Language Models for Secure Hardware Verification and Analysis |
30 | An Efficient Barrett Modular Multiplier Design for Zero-Knowledge Proof |
37 | Adversarially Evasive Hardware Trojans through Approximate Designs |
45 | A Quantitative Framework for Autocorrelation Analysis and Modeling Resistance Assessment of Physically Unclonable Functions |
48 | SHAFI: Securing Hash-Based Post-Quantum Cryptography from Hardware Fault Injection Attacks |
53 | NNUF: Nearest Neighbor Union-Find Decoder for Quantum Error Correction |
54 | SACRED EYE: Secure Communication and Decentralized Monitoring for Swarm UAV Mission Completion |
55 | Auto-profiling Attack on NTT Hardware Implementations |