The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "IVSW"( http://dblp.L3S.de/Venues/IVSW )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ivsw

Publication years (Num. hits)
2016 (12) 2017 (26) 2018 (19) 2019 (13)
Publication types (Num. hits)
inproceedings(66) proceedings(4)
Venues (Conferences, Journals, ...)
IVSW(70)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 70 publication records. Showing 70 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Miao Yu, Basel Halak, Mark Zwolinski Using Hardware Performance Counters to Detect Control Hijacking Attacks. Search on Bibsonomy IVSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1 4th IEEE International Verification and Security Workshop, IVSW 2019, Rhodes Island, Greece, July 1-3, 2019 Search on Bibsonomy IVSW The full citation details ... 2019 DBLP  BibTeX  RDF
1Honorio Martín, Elena Ioana Vatajelu, Giorgio Di Natale, Osnat Keren On the Reliability of the Ring Oscillator Physically Unclonable Functions. Search on Bibsonomy IVSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yildiran Yilmaz, Basel Halak A Two-Flights Mutual Authentication for Energy-Constrained IoT Devices. Search on Bibsonomy IVSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Marc Merandat, Vincent Reynaud, Emanuele Valea, Jérôme Quévremont, Nicolas Valette, Paolo Maistri, Régis Leveugle, Marie-Lise Flottes, Sophie Dupuis, Bruno Rouzeyre, Giorgio Di Natale A Comprehensive Approach to a Trusted Test Infrastructure. Search on Bibsonomy IVSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Zacharias Takakis, Dimitrios Mangiras, Chrysostomos Nicopoulos, Giorgos Dimitrakopoulos Dynamic Adjustment of Test-Sequence Duration for Increasing the Functional Coverage. Search on Bibsonomy IVSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ali Shuja Siddiqui, Geraldine Shirley, Shreya Bendre, Girija Bhagwat, Jim Plusquellic, Fareena Saqib Secure Design Flow of FPGA Based RISC-V Implementation. Search on Bibsonomy IVSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Batya Karp, Ofer Amrani, Osnat Keren Nonlinear Product Codes for Reliability and Security. Search on Bibsonomy IVSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nan Du, Mahdi Kiani, Xianyue Zhao, Danilo Bürger, Oliver G. Schmidt, Ramona Ecke, Stefan E. Schulz, Heidemarie Schmidt, Ilia Polian Electroforming-free Memristors for Hardware Security Primitives. Search on Bibsonomy IVSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Arash Nejat, Zahra Kazemi, Vincent Beroulle, David Hély, Mahdi Fazeli Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection. Search on Bibsonomy IVSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Haibo Su, Basel Halak, Mark Zwolinski Two-Stage Architectures for Resilient Lightweight PUFs. Search on Bibsonomy IVSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Zahra Kazemi, Athanasios Papadimitriou, Ioanna Souvatzoglou, Ehsan Aerabi, Mosabbah Mushir Ahmed, David Hély, Vincent Beroulle On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems: Clock Glitch Attacks. Search on Bibsonomy IVSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Aayush Singla, Bernhard Lippmann, Helmut Graeb Verification of Physical Chip Layouts Using GDSII Design Data. Search on Bibsonomy IVSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yildiran Yilmaz, Steve R. Gunn, Basel Halak Lightweight PUF-Based Authentication Protocol for IoT Devices. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Adam Hastings, Sean Jensen, Jeffrey Goeders, Brad L. Hutchings Using Physical and Functional Comparisons to Assure 3rd-Party IP for Modern FPGAs. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thao Le 0001, Lucas Weaver, Jia Di, Shaojie Zhang, Yier Jin Hardware Trojan Detection and Functionality Determination for Soft IPs. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Haibo Su, Mark Zwolinski, Basel Halak A Machine Learning Attacks Resistant Two Stage Physical Unclonable Functions Design. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sofiane Takarabt, Kais Chibani, Adrien Facon, Sylvain Guilley, Yves Mathieu, Laurent Sauvage, Youssef Souissi Pre-silicon Embedded System Evaluation as New EDA Tool for Security Verification. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alessandro Barenghi, Luca Breveglieri, Niccolò Izzo, Gerardo Pelosi Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Adrien Facon, Sylvain Guilley, Matthieu Lec'Hvien, Alexander Schaub 0001, Youssef Souissi Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Michael Werner, Bernhard Lippmann, Johanna Baehr, Helmut Gräb Reverse Engineering of Cryptographic Cores by Structural Interpretation Through Graph Analysis. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rolf Drechsler, Christoph Lüth, Görschwin Fey, Tim Güneysu Towards Self-Explaining Digital Systems: A Design Methodology for the Next Generation. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Amira Elhamshary, Yehea Ismail, Said Elkhamy Security Analysis of Chaotic Baker Maps. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rolf Drechsler Keynotes: Towards Self-Explaining Digital Systems: A Design Methodology for the Next Generation. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Maoyuan Qin, Wei Hu 0008, Dejun Mu, Yu Tai Property Based Formal Security Verification for Hardware Trojan Detection. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andrea Marcelli, Ernesto Sánchez 0001, Luca Sasselli, Giovanni Squillero On the Mitigation of Hardware Trojan Attacks in Embedded Processors by Exploiting a Hardware-Based Obfuscator. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1 3rd IEEE International Verification and Security Workshop, IVSW 2018, Costa Brava, Spain, July 2-4, 2018 Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  BibTeX  RDF
1Zahra Kazemi, Athanasios Papadimitriou, David Hély, Mahdi Fazeli, Vincent Beroulle Hardware Security Evaluation Platform for MCU-Based Connected Devices: Application to Healthcare IoT. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mathieu Da Silva, Emanuele Valea, Marie-Lise Flottes, Sophie Dupuis, Giorgio Di Natale, Bruno Rouzeyre A New Secure Stream Cipher for Scan Chain Encryption. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mosabbah Mushir Ahmed, David Hély, Etienne Perret, Nicolas Barbot, Romain Siragusa, Maxime Bernier, Frédéric Garet Authentication of Microcontroller Board Using Non-Invasive EM Emission Technique. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shakil Mahmud, Brooks Olney, Robert Karam Architectural Diversity: Bio-Inspired Hardware Security for FPGAs. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1M. Tanjidur Rahman, Qihang Shi, Shahin Tajik, Hao-Ting Shen, Damon L. Woodard, Mark M. Tehranipoor, Navid Asadizanjani Physical Inspection & Attacks: New Frontier in Hardware Security. Search on Bibsonomy IVSW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Padelis Papadopoulos, Anand Raman, Yorgos Koutsoyannopoulos, Nikolas Provatas, Magdy Abadir Challenges and trends in SOC Electromagnetic (EM) Crosstalk. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Erwan Fabiani, Loïc Lagadec, Mohamed Ben Hammouda, Ciprian Teodorov Asserting causal properties in High Level Synthesis. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jo Vliegen, Oscar Reparaz, Nele Mentens Maximizing the throughput of threshold-protected AES-GCM implementations on FPGA. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Debapriya Basu Roy, Shivam Bhasin, Ivica Nikolic, Debdeep Mukhopadhyay Opening pandora's box: Implication of RLUT on secure FPGA applications and IP security. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jan Burchard, Ange-Salomé Messeng Ekossono, Jan Horácek, Mael Gay, Bernd Becker 0001, Tobias Schubert 0001, Martin Kreuzer, Ilia Polian Towards mixed structural-functional models for algebraic fault attacks on ciphers. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Karen Horovitz, Meha Kainth, Ryan Kenny Protecting partial regions in FPGA bitstreams. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohd Syafiq Mispan, Basel Halak, Mark Zwolinski Lightweight obfuscation techniques for modeling attacks resistant PUFs. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Elena Ioana Vatajelu, Giorgio Di Natale, Paolo Prinetto Zero bit-error-rate weak PUF based on Spin-Transfer-Torque MRAM memories. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Steve Trimberger, Steve McNeil Security of FPGAs in data centers. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sebastian Wallat, Marc Fyrbiak, Moritz Schlögel, Christof Paar A look at the dark side of hardware reverse engineering - a case study. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rachael J. Parker Entropy justification for metastability based nondeterministic random bit generator. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kaibin Huang, Raylin Tso Provable secure dual-server public key encryption with keyword search. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ugo Mureddu, Oto Petura, Nathalie Bochard, Lilian Bossuet, Viktor Fischer Efficient design of Oscillator based Physical Unclonable Functions on Flash FPGAs. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Seyed-Abdollah Aftabjahani, Amitabh Das Robust secure design by increasing the resilience of Attack Protection Blocks. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Giorgio Di Natale, Marie-Lise Flottes, Sophie Dupuis, Bruno Rouzeyre Hacking the Control Flow error detection mechanism. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Eli Weintraub Estimating Target Distribution in security assessment models. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 IEEE 2nd International Verification and Security Workshop, IVSW 2017, Thessaloniki, Greece, July 3-5, 2017 Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  BibTeX  RDF
1Cyril Bresch, Adrien Michelet, Laurent Amato, Thomas Meyer, David Hély A red team blue team approach towards a secure processor design with hardware shadow stack. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1David McCann, Elisabeth Oswald Practical evaluation of masking software countermeasures on an IoT processor. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Evan Chavis, Harrison Davis, Yijun Hou, Matthew Hicks, Salessawi Ferede Yitbarek, Todd M. Austin, Valeria Bertacco SNIFFER: A high-accuracy malware detector for enterprise-based systems. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bozena Kaminska, Jasbir N. Patel, Hao Jiang Secure authentication of electronic systems with autonomous optical nano-devices. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marc Fyrbiak, Sebastian Strauss, Christian Kison, Sebastian Wallat, Malte Elson, Nikol Rummel, Christof Paar Hardware reverse engineering: Overview and open challenges. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gregoire Gimenez, Abdelkarim Cherkaoui, Raphael Frisch, Laurent Fesquet Self-timed Ring based True Random Number Generator: Threat model and countermeasures. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Elena Lai Leng Woo, Mark Zwolinski, Basel Halak Hardware performance counters for system reliability monitoring. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ryan Berryhill, Neil Veira, Andreas G. Veneris, Zissis Poulos Learning lemma support graphs in Quip and IC3. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mathieu Da Silva, Marie-Lise Flottes, Giorgio Di Natale, Bruno Rouzeyre Experimentations on scan chain encryption with PRESENT. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nejmeddine Alimi, Younes Lahbib, Mohsen Machhout, Rached Tourki Simulation-based verification of large-integer arithmetic circuits. Search on Bibsonomy IVSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Heinz Riener, Görschwin Fey Counterexample-guided diagnosis. Search on Bibsonomy IVSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Daniel Arumí, Salvador Manich, Rosa Rodríguez-Montañés RRAM based cell for hardware security applications. Search on Bibsonomy IVSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michael Tempelmeier, Georg Sigl MaskVer: a tool helping designers detect flawed masking implementations. Search on Bibsonomy IVSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Papa-Sidy Ba, Sophie Dupuis, Marie-Lise Flottes, Giorgio Di Natale, Bruno Rouzeyre Using outliers to detect stealthy hardware trojan triggering? Search on Bibsonomy IVSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gianpiero Cabodi, Paolo Camurati, Sebastiano F. Finocchiaro, Carmelo Loiacono, Francesco Savarese, Danilo Vendraminetto Secure Path Verification. Search on Bibsonomy IVSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Régis Leveugle, A. Chahed, Paolo Maistri, Athanasios Papadimitriou, David Hély, Vincent Beroulle On fault injections for early security evaluation vs. laser-based attacks. Search on Bibsonomy IVSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1John Adler, Ryan Berryhill, Andreas G. Veneris Revision debug with non-linear version history in regression verification. Search on Bibsonomy IVSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marek Cieplucha, Witold A. Pleskacz New architecture of the object-oriented functional coverage mechanism for digital verification. Search on Bibsonomy IVSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ioannis Vourkas, Angel Abusleme, Vasileios G. Ntinas, Georgios Ch. Sirakoulis, Antonio Rubio 0001 A Digital Memristor Emulator for FPGA-Based Artificial Neural Networks. Search on Bibsonomy IVSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ahmed Benhassain, Souhir Mhira, Florian Cacho, Vincent Huard, Lorena Anghel In-situ slack monitors: taking up the challenge of on-die monitoring of variability and reliability. Search on Bibsonomy IVSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1 1st IEEE International Verification and Security Workshop, IVSW 2016, Sant Feliu de Guixols, Spain, July 4-6, 2016 Search on Bibsonomy IVSW The full citation details ... 2016 DBLP  BibTeX  RDF
Displaying result #1 - #70 of 70 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license