Asian Hardware Oriented Security and Trust Symposium (AsianHOST)

December 19-21, 2025
Nanjing, China

Accepted Papers

Paper List

Regular Papers

Paper ID Paper Title
2BadHMP: Backdoor Attack Against Human Motion Prediction
7Fixbench-RTL: A Comprehensive Benchmark for Evaluating LLMs on RTL Debugging
10Privacy-Preserving CNN Inference on FPGA Framework with High Throughput
16Split+Prune: Constructing Minimal Eviction Set under the LRU Replacement Policy
19Lock+Umonitor+Umwait: Exposing the Security Risk of Lock Instruction in Achieving the Transient Execution Attack without Timer
20A Unified Hardware Accelerator for Paillier and ElGamal with Masking and Improved Randomized Montgomery Ladder
23Rethinking LLM Safety on Edge Devices: Unearthing Hidden Vulnerabilities through Power Stress
24Modeling Fault Propagation for Model-Based Diagnosis as a MaxSAT Problem
29FPGA-Accelerated SPHINCS+: An Area-Optimized and High-Throughput Design
31ARXPUF: A Modeling Attack Resilient Lightweight Strong PUF based on Add-Rotate-Xor
38RejSCore: Rejection Sampling Core for Multivariate-based Public key Cryptography
39DASH-T: A Lightweight Countermeasure Based on Dynamic Address Shuffling and Temporal-hiding for Kyber抯 PWM
42Evaluating Proposed Countermeasures for Power Analysis of Ring Oscillator PUFs
50A Portable and Hybrid Verification Framework Using C and UVM for Secure RISC-V SoCs
51Flexible NTT Accelerator Design Framework for Scalable Lattice-Based Cryptosystems
52PPA: Novel Page Prefetcher-Based Side-Channel Attacks

Posters

Paper ID Paper Title
6Leveraging Large Language Models for Secure Hardware Verification and Analysis
30An Efficient Barrett Modular Multiplier Design for Zero-Knowledge Proof
37Adversarially Evasive Hardware Trojans through Approximate Designs
45A Quantitative Framework for Autocorrelation Analysis and Modeling Resistance Assessment of Physically Unclonable Functions
48SHAFI: Securing Hash-Based Post-Quantum Cryptography from Hardware Fault Injection Attacks
53NNUF: Nearest Neighbor Union-Find Decoder for Quantum Error Correction
54SACRED EYE: Secure Communication and Decentralized Monitoring for Swarm UAV Mission Completion
55Auto-profiling Attack on NTT Hardware Implementations