2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops

1-5 Dec. 2012

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | |PDF file iconPDF (460 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | |PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | |PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - vi
    Request permission for commercial reuse | |PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • Message from HASP 2012 Organizers

    Publication Year: 2012, Page(s): vii
    Request permission for commercial reuse | |PDF file iconPDF (85 KB) | HTML iconHTML
    Freely Available from IEEE
  • HASP 2012 Workshop Organizers

    Publication Year: 2012, Page(s): viii
    Request permission for commercial reuse | |PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • HASP 2012 Program Committee

    Publication Year: 2012, Page(s): ix
    Request permission for commercial reuse | |PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • HASP 2012 Reviewers

    Publication Year: 2012, Page(s): x
    Request permission for commercial reuse | |PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • WNTC 2012 Introduction

    Publication Year: 2012, Page(s): xi
    Request permission for commercial reuse | |PDF file iconPDF (70 KB) | HTML iconHTML
    Freely Available from IEEE
  • From Cryptography to Hardware: Analyzing Embedded Xilinx BRAM for Cryptographic Applications

    Publication Year: 2012, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (247 KB) | HTML iconHTML

    Design of cryptographic applications need special care. For instance, physical attacks like Side-Channel Analysis (SCA) are able to recover the secret key, just by observing the activity of the computation, even for mathematically robust algorithms like AES. SCA considers the "leakage" of a well chosen intermediate variable correlated with the secret. Field programmable gate-arrays (FPGA) are ofte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power analysis of hardware implementations protected with secret sharing

    Publication Year: 2012, Page(s):9 - 16
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (447 KB) | HTML iconHTML

    We analyze the security of three-share hardware implementations against differential power analysis and advanced variants such as mutual information analysis. We present dedicated distinguishers that allow to recover secret key bits from any cryptographic primitive that is implemented as a sequence of quadratic functions. Starting from the analytical treatment of such distinguishers and informatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware Prefetchers Leak: A Revisit of SVF for Cache-Timing Attacks

    Publication Year: 2012, Page(s):17 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (218 KB) | HTML iconHTML

    Micro-architectural features have an influence on security against cache attacks. This paper shows that modern hardware prefetchers enabled in cache memories to reduce the miss penalty, can be a source of information leakage with respect to cache-timing attacks. The work revisits the Side Channel Vulnerability Factor (SVF) proposed in ISCA¿12 and shows how to adapt the metric to assess the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PHAP: Password based Hardware Authentication using PUFs

    Publication Year: 2012, Page(s):24 - 31
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (248 KB) | HTML iconHTML

    Hardware security is gaining significant importance with more emphasis on integrated circuit identification and authentication. To facilitate this process, Physically Unclonable Functions (PUFs) have been proposed as a viable solution. Many of the existing PUF based authentication protocols help to authenticate the device and does not authenticate the user. Here, we present Password based Hardware... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelet transform based pre-processing for side channel analysis

    Publication Year: 2012, Page(s):32 - 38
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (430 KB) | HTML iconHTML

    We suggest, in a methodological manner, the use of Wavelet transforms to improve side channel analysis (SCA). The proposed applications are involved in several side channel analysis aspects: storage of traces, patterns detection and noise filtering. We show that all these aspects are useful to improve evaluation of information leakages from embedded devices. In particular, we show how wavelets fav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An 8-bit AVR-Based Elliptic Curve Cryptographic RISC Processor for the Internet of Things

    Publication Year: 2012, Page(s):39 - 46
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (325 KB) | HTML iconHTML

    In recent years, a large body of research has been dedicated to the 'lightweight' implementation of Elliptic Curve Cryptography (ECC) for RFID tags, wireless sensor nodes, and other 'smart' devices that are supposed to become components of the Internet of Things (IoT). However, making ECC suitable for the IoT is far from trivial since many applications demand fast response times (i.e. high perform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security verification of hardware-enabled attestation protocols

    Publication Year: 2012, Page(s):47 - 54
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (934 KB) | HTML iconHTML

    Hardware-software security architectures can significantly improve the security provided to computer users. However, we are lacking a security verification methodology that can provide design-time verification of the security properties provided by such architectures. While verification of an entire hardware-software security architecture is very difficult today, this paper proposes a methodology ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-Display

    Publication Year: 2012, Page(s):55 - 62
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2200 KB) | HTML iconHTML

    While enriching the user experiences, the development of mobile devices and applications introduces new security and privacy vulnerabilities for the remote services accessed by mobile device users. A trusted and usable authentication architecture for mobile devices is thus in high demand. In this paper,we leverage a unified structure, consisting of transparent TFT based fingerprint sensors, touchs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic acceleration of multithreaded program critical paths in near-threshold systems

    Publication Year: 2012, Page(s):63 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (903 KB) | HTML iconHTML

    Near-Threshold Computing (NTC) is an effective technique to improve energy efficiency. However, single thread performance can suffer dramatically in NTC systems as cores must be run at low frequency to ensure proper operation. A potential way to solve this problem is to accelerate a core for a short period of time using dynamic voltage and frequency scaling (DVFS). This fast-mode execution option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low-Latency Mechanisms for Near-Threshold Operation of Private Caches in Shared Memory Multicores

    Publication Year: 2012, Page(s):68 - 73
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (341 KB) | HTML iconHTML

    Near-threshold voltage operation is widely acknowledged as a potential mechanism to achieve an order of magnitude reduction in energy consumption in future processors. However, processors cannot operate reliably below a minimum voltage, Vccmin, since hardware components may fail. SRAM bitcell failures in memory structures, such as caches, typically determine the Vccmin for a processor. Although th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance and Power Solutions for Caches Using 8T SRAM Cells

    Publication Year: 2012, Page(s):74 - 80
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (274 KB) | HTML iconHTML

    Voltage scaling can reduce power dissipation significantly. SRAM cells (which are traditionally implemented using six-transistor cells) can limit voltage scaling due to stability concerns. Eight-transistor (8T) cells were proposed to enhance cell stability under voltage scaling. 8T cells, however, suffer from costly write operations caused by the column selection issue. Previous work has proposed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2012, Page(s): 81
    Request permission for commercial reuse | |PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • [Publisher's information]

    Publication Year: 2012, Page(s): 82
    Request permission for commercial reuse | |PDF file iconPDF (169 KB)
    Freely Available from IEEE