{"id":126,"date":"2026-02-16T20:18:08","date_gmt":"2026-02-16T20:18:08","guid":{"rendered":"https:\/\/host.conferences.computer.org\/2026\/?page_id=126"},"modified":"2026-02-16T21:50:27","modified_gmt":"2026-02-16T21:50:27","slug":"accepted-papers","status":"publish","type":"page","link":"https:\/\/host.conferences.computer.org\/2026\/accepted-papers\/","title":{"rendered":"Accepted Papers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"126\" class=\"elementor elementor-126\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-99fdca9 e-flex e-con-boxed e-con e-parent\" data-id=\"99fdca9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da4bbb4 elementor-widget elementor-widget-heading\" data-id=\"da4bbb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Accepted Papers (Preliminary List)<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3795e1 elementor-widget elementor-widget-text-editor\" data-id=\"d3795e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3>The following is a preliminary, incomplete list of accepted papers for HOST 2026. The list will be updated as additional decisions are finalized.<\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb2dd02 elementor-widget elementor-widget-tablepress-table\" data-id=\"fb2dd02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"tablepress-table.default\">\n\t\t\t\t\t\n<table id=\"tablepress-5\" class=\"tablepress tablepress-id-5\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><strong>Authors<\/strong><\/th><th class=\"column-2\"><strong>Title<\/strong><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">Xiaobei Yan, Chip Hong Chang, Shangwei Guo and Tianwei Zhang<\/td><td class=\"column-2\">AdvProtego: A Unified Framework to SafeGuard Deep Learning<br \/>\nModels Against Side Channel Leakage<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">Xiaobei Yan, Han Qiu and Tianwei Zhang<\/td><td class=\"column-2\">ObfusBFA: A Holistic Approach to Safeguarding DNNs from<br \/>\nDifferent Types of Bit-Flip Attacks<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">Khurram Khalil and Khaza Anuarul Hoque<\/td><td class=\"column-2\">FlipLLM: Efficient Bit-Flip Attacks on Multimodal LLMs using Reinforcement Learning<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">Nuntipat Narkthong and Xiaolin Xu<\/td><td class=\"column-2\">PermuteV: A Performant Side-channel-Resistant RISC-V Core<br \/>\nSecuring Edge AI Inference<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">Mahdi Hasanzadeh, Mahdi Fazeli, Kasem Khalil, Cynthia<br \/>\nSturton and Ahmad Patooghy<\/td><td class=\"column-2\">HeatGuard: Adaptive Mitigation in Securing NoC-Based MPSoCs<br \/>\nAgainst Analog Thermal Anomalies<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">Yazheng Tu and Jiafeng Xie<\/td><td class=\"column-2\">LEAH: Lightweight and Efficient Hardware Accelerator for<br \/>\nCode-based PQC Scheme HQC<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">Tarikul Islam Tamiti, Biraj Joshi, Rida Hasan and<br \/>\nAnomadarshi Barua<\/td><td class=\"column-2\">WaLi: Can Pressure Sensors in HVAC Systems Capture Human<br \/>\nSpeech?<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">Lorenzo Casalino, Maria M\u00e9ndez Real, Jean-Christophe<br \/>\nPr\u00e9votet and Rub\u00e9n Salvador<\/td><td class=\"column-2\">Double Strike: Breaking Approximation-based Side-Channel<br \/>\nCountermeasures for DNNs<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">Anjali Murali, Matchima Buddhanoy, Mondol Anik Kumar,<br \/>\nAleksandar Milenkovic, Indrajit Ray, Sudeep Pasricha and<br \/>\nBiswajit Ray<\/td><td class=\"column-2\">Erasing Is Not Enough: Data Leakage from Sanitized<br \/>\nCharge-Trap NOR Flash Devices<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">Ishraq Tashdid, Tasnuva Farheen and Sazadur Rahman<\/td><td class=\"column-2\">InterPUF: Distributed Authentication via Delay PUF and MPC<br \/>\nfor Reconfigurable Chiplet Interposers<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">Anthony Etim, Srilalith Nampally, Aubtin Rasouli, Dustin<br \/>\nMazza, Krishna Chilakapati, Tinghung Chiu, Ferhat Erata,<br \/>\nLeyla Nazhandali, Wenjie Xiong and Jakub Szefer<\/td><td class=\"column-2\">Fault Injection Attacks and Countermeasures on TinyML<br \/>\nAlgorithms<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">Donald Lushi and Samah Saeed<\/td><td class=\"column-2\">MCM-Leak: Exploiting Mid-Circuit Measurement Control for<br \/>\nCovert Quantum Information Leakage<\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">Soline Casavecchia, Driss Aboulkassimi, Jessy Cl\u00e9di\u00e8re,<br \/>\nJean-Max Dutertre and Simon Ponti\u00e9<\/td><td class=\"column-2\">Exploring Laser Fault Injection in System-On-Chips: A New<br \/>\nApproach for CPU and Cache Attacks<\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">Tejeshwar Bhagatsing Thorawade, Varun Venkitaraman,<br \/>\nKeerthisagar Kokkiligadda, Samiksha Verma and Virendra Singh<\/td><td class=\"column-2\">VTrack: Defending Against All Rowhammer Attack Patterns by<br \/>\nTracking Victim Rows<\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">Fatemeh Moradihaghighi, Zihao Zhan, Yanan Guo, Ziming Zhao,<br \/>\nMashrur Chowdhury and Zhenkai Zhang<\/td><td class=\"column-2\">Fuzz\u2019EMup: Leveraging EM Side-Channel Emanation to Guide<br \/>\nBlack-Box Embedded Firmware Fuzzing<\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">Sophia Zhang, Bo-Yuan Huang, Sayak Ray, Jason Fung, Aarti<br \/>\nGupta and Sharad Malik<\/td><td class=\"column-2\">Formal Firmware Verification of an At-Scale VM-level TEE<br \/>\nArchitecture<\/td>\n<\/tr>\n<tr class=\"row-18\">\n\t<td class=\"column-1\">Habib Ur Rahman, Matchima Buddhanoy, Mondol Anik Kumar,<br \/>\nSudeep Pasricha and Biswajit Ray<\/td><td class=\"column-2\">RowHammer Vulnerabilities in 3D NAND Flash Induced by Hot<br \/>\nCarrier Injection<\/td>\n<\/tr>\n<tr class=\"row-19\">\n\t<td class=\"column-1\">Kazi Mejbaul Islam, Emmanuel Elias, Baibhab Chatterjee,<br \/>\nDebayan Das and Sandip Ray<\/td><td class=\"column-2\">Logic Infusion: Exploiting Topology as a Power Side-Channel<br \/>\nCountermeasure in FPGA-based AES<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-5 from cache -->\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Accepted Papers (Preliminary List) The following is a preliminary, incomplete list of accepted papers for HOST 2026. The list will be updated as additional decisions are finalized. Edit Authors Title Xiaobei Yan, Chip Hong Chang, Shangwei Guo and Tianwei Zhang AdvProtego: A Unified Framework to SafeGuard Deep Learning Models Against Side Channel Leakage Xiaobei Yan, [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-126","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/pages\/126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/comments?post=126"}],"version-history":[{"count":0,"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/pages\/126\/revisions"}],"wp:attachment":[{"href":"https:\/\/host.conferences.computer.org\/2026\/wp-json\/wp\/v2\/media?parent=126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}