All Stories

  1. Formal Verification of Virtualization-Based Trusted Execution Environments
  2. How AI Hardware Clues Can Compromise Neural Networks and User Security and Privacy
  3. How Hackers Could Track Data Inside Chips and Compromise Anonymity and How We Can Stop Them
  4. Lightweight Multicast Authentication in NoC-based SoCs
  5. How Safe Are the Communication Inside Our Chips? A Look at Security of Different Technologies
  6. Lightweight Encryption Using Chaffing and Winnowing with All-or-Nothing Transform for Network-on-Chip Architectures
  7. Continuous Automatic Bioacoustics Monitoring of Bird Calls with Local Processing on Node Level