
Twenty-Fourth International Conference on Architec-
tural Support for Programming Languages and Op-
erating Systems, ASPLOS ’19, pages 469–484, New
York, NY, USA. Association for Computing Machin-
ery.
Gruss, D., Spreitzer, R., and Mangard, S. (2015). Cache
template attacks: automating attacks on inclusive last-
level caches. In Proceedings of the 24th USENIX
Conference on Security Symposium, SEC’15, page
897–912, USA. USENIX Association.
Gueron, S. (2016). A memory encryption engine suitable
for general purpose processors. Cryptology ePrint
Archive, Paper 2016/204.
Harris, A., Verma, T., Wei, S., Biernacki, L., Kisil, A.,
Aga, M. T., Bertacco, V., Kasikci, B., Tiwari, M.,
and Austin, T. (2021). Morpheus II: A RISC-V Secu-
rity Extension for Protecting Vulnerable Software and
Hardware. In 2021 IEEE International Symposium on
Hardware Oriented Security and Trust (HOST), pages
226–238.
Henson, M. and Taylor, S. (2014). Memory encryption: A
survey of existing techniques. ACM Comput. Surv.,
46(4):53:1–53:26.
Kc, G. S., Keromytis, A. D., and Prevelakis, V. (2003).
Countering code-injection attacks with instruction-set
randomization. In Proceedings of the 10th ACM con-
ference on Computer and communications security,
CCS ’03, pages 272–280, New York, NY, USA. As-
sociation for Computing Machinery.
Kocher, P., Genkin, D., Gruss, D., Haas, W., Hamburg, M.,
Lipp, M., Mangard, S., Prescher, T., Schwarz, M., and
Yarom, Y. (2018). Spectre Attacks: Exploiting Spec-
ulative Execution. arXiv:1801.01203.
Kocher, P., Horn, J., Fogh, A., Genkin, D., Gruss, D., Haas,
W., Hamburg, M., Lipp, M., Mangard, S., Prescher,
T., Schwarz, M., and Yarom, Y. (2020). Spectre at-
tacks: exploiting speculative execution. Commun.
ACM, 63(7):93–101.
Leupers, R., Martin, G., Plyaskin, R., Herkersdorf, A.,
Schirrmeister, F., Kogel, T., and Vaupel, M. (2012).
Virtual platforms: Breaking new grounds. In Design,
Automation and Test in Europe, pages 685–690.
Liu, C., Wang, X. S., Nayak, K., Huang, Y., and Shi, E.
(2015). ObliVM: A Programming Framework for Se-
cure Computation. In 2015 IEEE Symposium on Secu-
rity and Privacy, pages 359–376. ISSN: 2375-1207.
Maas, M., Love, E., Stefanov, E., Tiwari, M., Shi, E.,
Asanovic, K., Kubiatowicz, J., and Song, D. (2013).
PHANTOM: Practical Oblivious Computation in a
Secure Processor. CCS ’13, pages 311–324. ACM.
Rass, S. and Schartner, P. (2016). On the Security of a Uni-
versal Cryptocomputer: the Chosen Instruction At-
tack. IEEE Access, 4:7874–7882. Conference Name:
IEEE Access.
Rass, S., Schartner, P., and Wamser, M. (2015). Oblivious
Lookup Tables. Tatra Mountains Mathematical Pub-
lications, 67.
Schl
¨
agl, M. and Große, D. (2025). Fast interpreter-based
instruction set simulation for virtual prototypes. In
Design, Automation and Test in Europe Conference
(DATE).
Schl
¨
agl, M., Hazott, C., and Große, D. (2024a). RISC-V
VP++: Next generation open-source virtual prototype.
In Workshop on Open-Source Design Automation.
Schl
¨
agl, M., Stockinger, M., and Große, D. (2024b). A
RISC-V “V” VP: Unlocking Vector Processing for
Evaluation at the System Level. In Design, Automa-
tion and Test in Europe Conference (DATE), pages 1–
6.
Shacham, H. (2007). The geometry of innocent flesh on
the bone: return-into-libc without function calls (on
the x86). In Proceedings of the 14th ACM conference
on Computer and communications security, CCS ’07,
pages 552–561, New York, NY, USA. Association for
Computing Machinery.
Stecklina, O., Langend
¨
orfer, P., Vater, F., Kranz, T., and
Leander, G. (2015). Intrinsic Code Attestation by In-
struction Chaining for Embedded Devices. In Security
and Privacy in Communication Networks, pages 97–
115, Cham. Springer International Publishing.
Tice, C., Roeder, T., Collingbourne, P., Checkoway, S., Er-
lingsson,
´
U., Lozano, L., and Pike, G. (2014). En-
forcing Forward-Edge Control-Flow integrity in GCC
& LLVM. In 23rd USENIX Security Symposium
(USENIX Security 14), pages 941–955, San Diego,
CA. USENIX Association.
Tsoutsos, N. G. and Maniatakos, M. (2014). HEROIC:
Homomorphically EncRypted One Instruction Com-
puter. In 2014 Design, Automation & Test in Europe
Conference & Exhibition (DATE), pages 1–6. ISSN:
1558-1101.
Wang, X., Chen, H., Jia, Z., Zeldovich, N., and Kaashoek,
M. F. (2012). Improving integer security for systems
with KINT. In 10th USENIX Symposium on Operat-
ing Systems Design and Implementation (OSDI 12),
pages 163–177, Hollywood, CA. USENIX Associa-
tion.
Waterman, A., Lee, Y., Avizienis, R., Patterson, D. A., and
Asanovic, K. (2016). The risc-v instruction set manual
volume ii: Privileged architecture version 1.7. EECS
Department, University of California, Berkeley, Tech.
Rep. UCB/EECS-2016-129.
Waterman, A., Lee, Y., Patterson, D. A., and Asanovic, K.
(2011). The risc-v instruction set manual, volume i:
Base user-level isa. eecs department. University of
California.
Werner, M., Unterluggauer, T., Schaffenrath, D., and Man-
gard, S. (2018). Sponge-Based Control-Flow Protec-
tion for IoT Devices: 2018 IEEE European Sympo-
sium on Security and Privacy. 2018 IEEE European
Symposium on Security and Privacy. Publisher: IEEE.
Zahur, S. and Evans, D. (2015). Obliv-c: A language for
extensible data-oblivious computation. Cryptology
ePrint Archive, Paper 2015/1153.
Zahur, S., Rosulek, M., and Evans, D. (2015). Two Halves
Make a Whole. In Advances in Cryptology - EU-
ROCRYPT 2015, pages 220–250, Berlin, Heidelberg.
Springer.
SECRYPT 2025 - 22nd International Conference on Security and Cryptography
246