{"id":"https://openalex.org/W4308219322","doi":"https://doi.org/10.1145/3560834","title":"Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security","display_name":"Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security","publication_year":2022,"publication_date":"2022-11-04","ids":{"openalex":"https://openalex.org/W4308219322","doi":"https://doi.org/10.1145/3560834"},"language":"en","primary_location":{"id":"doi:10.1145/3560834","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3560834","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Mukhopadhyay, D.","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mukhopadhyay, D.","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Forte, D.","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Forte, D.","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Chang, C.H.","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chang, C.H.","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"R\u00fchrmair, U.","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"R\u00fchrmair, U.","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Regazzoni, F.","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Regazzoni, F.","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9767000079154968,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9767000079154968,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6248530149459839},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6202027797698975},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.6062906384468079},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5981595516204834},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5661197304725647},{"id":"https://openalex.org/keywords/interfacing","display_name":"Interfacing","score":0.4537737965583801},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4279294013977051},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3406582474708557},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.23969590663909912}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6248530149459839},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6202027797698975},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.6062906384468079},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5981595516204834},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5661197304725647},{"id":"https://openalex.org/C2776303644","wikidata":"https://www.wikidata.org/wiki/Q1020499","display_name":"Interfacing","level":2,"score":0.4537737965583801},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4279294013977051},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3406582474708557},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.23969590663909912},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3560834","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3560834","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},{"id":"pmh:oai:dare.uva.nl:openaire_cris_publications/8a0606d8-db0d-4d3c-8eab-60eb63f9e646","is_oa":false,"landing_page_url":"https://handle.uba.uva.nl/personal/pure/en/publications/ashes-2022--welcome-message(8a0606d8-db0d-4d3c-8eab-60eb63f9e646).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400088","display_name":"UvA-DARE (University of Amsterdam)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I887064364","host_organization_name":"University of Amsterdam","host_organization_lineage":["https://openalex.org/I887064364"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Mukhopadhyay, D, Forte, D, Chang, C H, R\u00fchrmair, U & Regazzoni, F 2022, ASHES 2022 - Welcome Message. in ASHES '22 : Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security : November 11, 2022, Los Angeles, CA, USA. New York, New York, pp. iii-iv, 6th Workshop on Attacks and Solutions in Hardware Security, ASHES 2022, co-located with the ACM Conference on Computer and Communications Security, CCS 2022, Los Angeles, United States, 11/11/22. https://doi.org/10.1145/3560834","raw_type":"info:eu-repo/semantics/annotation"},{"id":"pmh:oai:dare.uva.nl:publications/8a0606d8-db0d-4d3c-8eab-60eb63f9e646","is_oa":false,"landing_page_url":"https://hdl.handle.net/11245.1/8a0606d8-db0d-4d3c-8eab-60eb63f9e646","pdf_url":null,"source":{"id":"https://openalex.org/S4306400088","display_name":"UvA-DARE (University of Amsterdam)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I887064364","host_organization_name":"University of Amsterdam","host_organization_lineage":["https://openalex.org/I887064364"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Mukhopadhyay, D, Forte, D, Chang, C H, R\u00fchrmair, U & Regazzoni, F 2022, ASHES 2022 - Welcome Message. in ASHES '22 : Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security : November 11, 2022, Los Angeles, CA, USA. New York, New York, pp. iii-iv, 6th Workshop on Attacks and Solutions in Hardware Security, ASHES 2022, co-located with the ACM Conference on Computer and Communications Security, CCS 2022, Los Angeles, United States, 11/11/22. https://doi.org/10.1145/3560834","raw_type":"info:eu-repo/semantics/annotation"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2136647108","https://openalex.org/W1965180958","https://openalex.org/W2350029007","https://openalex.org/W2152662857","https://openalex.org/W2182594080","https://openalex.org/W1973428399","https://openalex.org/W2017757432","https://openalex.org/W2047994557","https://openalex.org/W4317795068","https://openalex.org/W2781893022"],"abstract_inverted_index":{"It":[0,104],"is":[1],"our":[2],"great":[3],"pleasure":[4],"to":[5,8,39,44,80,116,175],"welcome":[6],"you":[7],"the":[9,27,40,95,130,151],"Sixth":[10],"Workshop":[11],"on":[12,30,92,110,147],"Attacks":[13],"and":[14,32,43,70,76,98,101,134,161,170],"Solutions":[15],"in":[16,50,60],"Hardware":[17],"Security":[18,34],"2022":[19,35],"(ASHES":[20],"2022),":[21],"a":[22,85,172],"post-conference":[23],"satellite":[24],"workshop":[25,96,144],"of":[26,73,132,153],"ACM":[28],"Conference":[29],"Computer":[31],"Communications":[33],"(CCS":[36],"2022).":[37],"Due":[38],"ongoing":[41],"pandemic":[42],"provide":[45],"greater":[46],"flexibility":[47],"for":[48,88],"attendees":[49],"areas":[51],"where":[52],"travel":[53],"was":[54,58],"still":[55],"inconvenient,":[56],"ASHES":[57,65,164],"held":[59],"hybrid":[61],"mode":[62],"this":[63,81],"year.":[64],"deals":[66],"with":[67,180],"all":[68],"theoretical":[69],"practical":[71],"aspects":[72],"hardware":[74,93,114,135],"security":[75],"welcomes":[77],"any":[78],"contributions":[79],"area.":[82],"Besides":[83],"being":[84],"mainstream":[86],"platform":[87],"disseminating":[89],"fundamental":[90],"research":[91],"security,":[94,136,156],"encourages":[97],"promotes":[99],"emerging":[100,127],"new":[102],"ideas.":[103],"includes":[105],"topics":[106,128],"like":[107,150],"physical":[108],"attacks":[109],"electronic":[111],"circuits,":[112,125],"secure":[113,121],"designs":[115],"counter":[117],"such":[118,137],"attacks,":[119],"lightweight":[120],"designs,":[122],"post-quantum":[123],"cryptographic":[124],"or":[126,159],"at":[129,167],"intersection":[131],"nanotechnology":[133],"as":[138],"physically":[139],"unclonable":[140],"functions":[141],"(PUFs).":[142],"The":[143],"also":[145],"focusses":[146],"recent":[148],"applications":[149],"internet":[152],"things,":[154],"automotive":[155],"smart":[157],"homes,":[158],"pervasive":[160],"wearable":[162],"computing.":[163],"thereby":[165],"aims":[166],"giving":[168],"researchers":[169],"practitioners":[171],"unique":[173],"opportunity":[174],"mutually":[176],"share":[177],"their":[178],"perspectives":[179],"each":[181],"other.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
