by Biswabandan Panda on Dec 11, 2024 | Tags: caches, Security
This blog post is a continuation of Gururaj’s SIGARCH blog, written three years ago. It revisits the design of secure caches and, primarily, two design choices available to the designers: partitioned cache and randomized cache. In the last three years,...
Read more...
by Daniel Moghimi on Sep 26, 2024 | Tags: Security
The discovery of Meltdown and Spectre, along with their extensive media coverage, brought hardware security research to the spotlight. A wake-up call for major chipset manufacturers such as Intel, AMD, and ARM, we learnt that hardware vulnerabilities can be exploited...
Read more...
by Ghadeer Almusaddar and Yicheng Zhang on Sep 9, 2024 | Tags: Conferences, Security
33rd USENIX Security Symposium was held in Philadelphia in August 2024. Following recent trends, the symposium featured several sessions dedicated to hardware and microarchitectural security. The program includes papers targeting side-channels and covert channels...
Read more...
by Josep Torrellas on Jun 13, 2024 | Tags: Distributed Computing, Energy-Efficiency, Security
One of the most pressing challenges facing today’s digital society is how to curb the relentless increase in the energy consumption of computing. Without major action, such an increase is even likely to accelerate, as ubiquitous AI models are embedded in applications...
Read more...
by Jakub Szefer on Mar 1, 2023 | Tags: Cryptography, Post Quantum Cryptography, Quantum Computing, Security
Introduction Quantum computer architecture security research is a new and active research field. As the new year and semester is under way, this article looks back at the recent quantum computer architecture security papers published or posted online in the prior year...
Read more...