Cherifying Linux: A Practical View on using CHERI
Proceedings of the 17th European Workshop on Systems Security
Association for Computing Machinery
2024
Unlock the Door to my Secrets, but don’t Forget to Glitch: A comprehensive analysis of flash erase suppression attacks
IACR Transactions on Cryptographic Hardware and Embedded Systems
2024
2024
2
88--129
Side-Channel Analysis of Integrate-and-Fire Neurons Within Spiking Neural Networks
IEEE Transactions on Circuits and Systems I: Regular Papers
2024
1-13
Remote side-channel analysis of the loop PUF using a TDC-based voltage sensor
Journal of Cryptographic Engineering
2025
15
1
1
RISC-V Triplet: Tapeouts for Security Applications
2024 IEEE Nordic Circuits and Systems Conference (NorCAS)
Lund / Sweden
2024
On the Importance of Physical Model Parameters for PUF Performance: A Case Study on BFO Memristors
2024 39th Conference on Design of Circuits and Integrated Systems (DCIS)
Italy, Catania
2024
Switch-Glitch : Location of Fault Injection Sweet Spots by Electro-Magnetic Emanation
2024 Workshop on Fault Detection and Tolerance in Cryptography (FDTC)
Halifax - Canada
2024
Trojan Assets and Attack Vectors in Processors
2024 25th International Symposium on Quality Electronic Design (ISQED)
2024
A Lightweight Firmware Resilience Engine for IoT Devices Leveraging Minimal Processor Features
2024 IEEE International Conference on Cyber Security and Resilience (CSR)
London, UK
2024
Performance and Communication Cost of Hardware Accelerators for Hashing in Post-Quantum Cryptography
ACM Trans. Embed. Comput. Syst.
2024
Jul