by Daniel Moghimi on Sep 26, 2024 | Tags: Security
The discovery of Meltdown and Spectre, along with their extensive media coverage, brought hardware security research to the spotlight. A wake-up call for major chipset manufacturers such as Intel, AMD, and ARM, we learnt that hardware vulnerabilities can be exploited...
Read more...
by Ghadeer Almusaddar and Yicheng Zhang on Sep 9, 2024 | Tags: Conferences, Security
33rd USENIX Security Symposium was held in Philadelphia in August 2024. Following recent trends, the symposium featured several sessions dedicated to hardware and microarchitectural security. The program includes papers targeting side-channels and covert channels...
Read more...
by Josep Torrellas on Jun 13, 2024 | Tags: Distributed Computing, Energy-Efficiency, Security
One of the most pressing challenges facing today’s digital society is how to curb the relentless increase in the energy consumption of computing. Without major action, such an increase is even likely to accelerate, as ubiquitous AI models are embedded in applications...
Read more...
by Jakub Szefer on Mar 1, 2023 | Tags: Cryptography, Post Quantum Cryptography, Quantum Computing, Security
Introduction Quantum computer architecture security research is a new and active research field. As the new year and semester is under way, this article looks back at the recent quantum computer architecture security papers published or posted online in the prior year...
Read more...
by Jakub Szefer on Oct 10, 2022 | Tags: Architecture, Quantum Computing, Security
Introduction When thinking of security and quantum computers, many people may automatically think of using quantum computers for attacks on classical computers, by use of the Grover’s and Shor’s algorithms running on the quantum computers to break a number of existing...
Read more...