IFS-L2.6
RISC-V Microarchitecture Information Leakage Attack via Transient Execution
Jiashun Wang, Rundi Zhai, Yishuo Wang, Chaoyue Liang, Baojiang Cui, Beijing University of Posts and Telecommunications, China
Session:
IFS-L2: Robust and Secure AI: From LLMs to Microarchitecture Oral
Track:
Information Forensics and Security [IF]
Location:
Room 133+134
Presentation Time:
Wed, 6 May, 15:40 - 16:00
Presentation
Discussion
Resources
No resources available.
Session IFS-L2
IFS-L2.1: CorrEctor: An Execute-to-Correct Paradigm for Efficient LLM Secure Inference
Dong Liu, Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; State Key Laboratory of Cyberspace Security Defense, China; Bingzheng Wang, Institute of Information Engineering, Chinese Academy of Sciences, China; Yifan Zeng, Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; State Key Laboratory of Cyberspace Security Defense, China; Minghui Pan, Beijing University of Posts and Telecommunications, China; Jiang Zhou, Xiaoyan Gu, Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; State Key Laboratory of Cyberspace Security Defense, China
IFS-L2.2: GSPrivacy:Attribute-Preserving Face Anonymous Framework VIA Fully Controllable Gaussian Head Avatar
Gen Li, XinYang Li, GongXin Yao, YiXin Xuan, Yu Pan, Zhejiang University, China
IFS-L2.3: TFF-ID: A TRAINING-FREE FRAMEWORK FOR INVERTIBLE AND DIVERSIFIED FACE ANONYMIZATION
Jie Wang, Yi Hao Wang, Ru Zhang, Jian Yi Liu, Beijing University of Posts and Telecommunications, China
IFS-L2.4: LSP Framework: A Compensatory Model for Defeating Trigger Reverse Engineering via Label Smoothing Poisoning
Beichen Li, Yuanfang Guo, Heqi Peng, Beihang University, China; Yangxi Li, National Computer Network Emergency Response Technical Team/Coordination Center of China, China; Jiantao Zhou, University of Macau, China; Yunhong Wang, Beihang University, China
IFS-L2.5: ADVERSARIAL FINE-TUNING ON SPEECH FOUNDATION MODEL WITH VULNERABLE ATTENTION CONSISTENCY REGULARIZATION FOR ROBUST SPEECH RECOGNITION
Yanyun Wang, The Hong Kong University of Science and Technology (Guangzhou), China; Baoyuan Wu, The Chinese University of Hong Kong, Shenzhen & Shenzhen Loop Area Institute, China; Li Liu, The Hong Kong University of Science and Technology (Guangzhou), China
IFS-L2.6: RISC-V Microarchitecture Information Leakage Attack via Transient Execution
Jiashun Wang, Rundi Zhai, Yishuo Wang, Chaoyue Liang, Baojiang Cui, Beijing University of Posts and Telecommunications, China
Contacts