Penelitian ini bertujuan mengkaji faktor-faktor HOT-FIT yaitu Human, Organization dan Technology untuk mengukur kinerja keamanan siber yang...
This study, titled "ANALISIS MODEL HOT-FIT TERHADAP KINERJA KEAMANAN SIBER DENGAN MEDIASI KESIAPAN KEAMANAN SIBER DI RSUD AJIBARANG," addresses a crit...
In handling computer forensics with backward chaining, the cybercrime detection expert system serves to detect cybercrime crimes committed by crim...
This paper proposes an expert system utilizing backward chaining to assist in cybercrime detection within computer forensics, aiming to identify speci...
Rowhammer has been shown to be an extensive attack vector. In the years since its discovery, numerous exploits have been shown, attacking...
This paper investigates a novel and increasingly relevant attack surface for Rowhammer: Solid State Drives (SSDs), specifically those leveraging the H...
Industrial-scale reverse engineering affects the majority of companies in the mechanical and plant engineering sector and imposes significa...
This talk introduces GlueZilla, a novel system designed to combat industrial-scale reverse engineering, particularly focusing on the replication of ha...
WebGL offers website direct access to the GPU, allowing beautiful graphics. The direct hardware access offered by WebGL was also shown to...
This submission presents a timely and relevant investigation into the security implications of the newly introduced WebGPU API, specifically concernin...
The density of memory cells in modern DRAM is so high that frequently accessing a memory row can flip bits in nearby rows. That effect is c...
This paper, titled "Flipper: Rowhammer on Steroids," presents a compelling advancement in Rowhammer research by introducing Flipper, an amplification...
In many real-world scenarios, being able to infer specific software versions or variations of cryptographic libraries is critical to mounti...
This paper, titled "PortPrint: Identifying Inaccessible Code with Port Contention," addresses a critical challenge in security research: inferring spe...
Microarchitectural attacks threaten system security and privacy, especially if they can be mounted without native code execution. Recent re...
This paper introduces a significant new vector for microarchitectural attacks, expanding the landscape of "scriptless" side-channel vulnerabilities. B...
Detecting malicious software or hardware behavior during the operation of a computer system requires observables from one or more abstracti...
The submission, titled "Poster: A microarchitectural signals analysis platform to craft Hardware Security Counters," addresses a critical challenge in...
This poster proposes to address the critical challenge of "Isolating PIM from OS Level Adversaries," a topic of high relevance in contemporary system...
Showing 1 to 10 of 20 results
By Sciaria
By Sciaria
By Sciaria
By Sciaria
By Sciaria
By Sciaria