Browse Research
Home Research
Lucas Georget, Vincent Migliore, Vincent Nicomette, Arthur Villard, Frédéric Silvi
Poster: A microarchitectural signals analysis platform to craft Hardware Security Counters
Cyber

Detecting malicious software or hardware behavior during the operation of a computer system requires observables from one or more abstracti...

Review:

The submission, titled "Poster: A microarchitectural signals analysis platform to craft Hardware Security Counters," addresses a critical challenge in...

View Full Research
Fabian van Rissenbeck, Amit Pravin Choudhari, Christian Rossow
Poster: Isolating PIM from OS Level Adversaries
Cyber

Review:

This poster proposes to address the critical challenge of "Isolating PIM from OS Level Adversaries," a topic of high relevance in contemporary system...

View Full Research
Antoine Geimer, Mathéo Vergnolle, Frédéric Recoules, Lesly-Ann Daniel, Sébastien Bardin, Clémentine Maurice
Poster: Systematic Evaluation of Automated Tools for Side-Channel Vulnerability Detection in Cryptographic Libraries
Cryptography

To protect cryptographic implementations from side-channel vulnerabilities, developers must adopt constant-time programming practices. As...

Review:

This poster addresses a critical gap in the field of cryptographic security: the persistent presence of side-channel vulnerabilities despite the avail...

View Full Research
Daan Vanoverloop, Andrés Sánchez, Victor Bullynck, Flavio Toffalini, Frank Piessens, Mathias Payer, Jo Van Bulck
Talk: Blurring Enclave Page Accesses in Space and Time with Compile-Time Instrumentation
Cyber

This talk overviews our recent work on TLBlur, a novel approach that leverages compiler instrumentation and the recent AEX-Notify hardware...

Review:

This talk outlines "TLBlur," a promising new approach to mitigating controlled-channel attacks against Intel SGX enclaves. The work leverages a novel...

View Full Research
Jacqueline Henes, Marius Muench, David Oswald, Hany Ragab
Talk: Transient-execution attacks on the CHERI Morello platform
Informatics

CHERI (Capability Hardware Enhanced RISC Instructions) is a capability-based ISA extension providing spatial memory protection and compar...

Review:

The abstract for "Talk: Transient-execution attacks on the CHERI Morello platform" introduces a highly timely and critical area of research at the int...

View Full Research
Alex Prong
"And the rain won't make any difference?"
Philosophy

Review:

I am unable to provide a review at this time as the abstract text has not been provided. The abstract is a crucial component for evaluating a manuscri...

View Full Research
Shane Neilson
Negative Capabilizing Biomedicine through Translationality
Biomedical

Review:

The title, "Negative Capabilizing Biomedicine through Translationality," immediately signals a highly original and theoretically sophisticated interve...

View Full Research
Rose James, Jennifer Brant
Envisioning Anti-colonial Futures
Sociology

Review:

This review is written under the significant limitation of lacking an abstract. Based solely on the title, "Envisioning Anti-colonial Futures," the pa...

View Full Research
Evangeline Holtz-Schramek
"Whose details are these?"
Research

Review:

This submission, titled "Whose details are these?", presents an intriguing question that immediately piques interest, hinting at potential inquiries i...

View Full Research
Eriga Sarmalinda, Abdul Karim, Nugroho
MAKNA SIMBOLIK TRADISI TOLAK BALA SEDEKAH PETANG JUM’AT PADA MASYARAKAT ISLAM DI DESA SUNGAI PINANG KABUPATEN MUSI RAWAS
Anthropology

Penelitian ini berjudul “Makna Simbolik Tradisi Tolak Bala Sedekah Petang Jum’at pada Masyarakat Islam di Sungai Pinang Kabupaten Musi Rawas.” Fokus p...

Review:

This study delves into a fascinating aspect of local Islamic tradition, specifically the "Makna Simbolik Tradisi Tolak Bala Sedekah Petang Jum’at" (Sy...

View Full Research