|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 510 publication records. Showing 510 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Yinghua Hu, Yuke Zhang, Kaixin Yang, Dake Chen, Peter A. Beerel, Pierluigi Nuzzo 0002 |
Fun-SAT: Functional Corruptibility-Guided SAT-Based Attack on Sequential Logic Encryption. |
HOST |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jingtao Li, Zhezhi He, Adnan Siraj Rakin, Deliang Fan, Chaitali Chakrabarti |
NeurObfuscator: A Full-stack Obfuscation Tool to Mitigate Neural Architecture Stealing. |
HOST |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Hansika Weerasena, Subodha Charles, Prabhat Mishra 0001 |
Lightweight Encryption Using Chaffing and Winnowing with All-or-Nothing Transform for Network-on-Chip Architectures. |
HOST |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Austin Harris 0001, Tarunesh Verma, Shijia Wei, Lauren Biernacki, Alex Kisil, Misiker Tadesse Aga, Valeria Bertacco, Baris Kasikci, Mohit Tiwari, Todd M. Austin |
Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and Hardware. |
HOST |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Shih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, Mohammad Abdullah Al Faruque |
HW2VEC: a Graph Learning Tool for Automating Hardware Security. |
HOST |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Usman Ali, Omer Khan |
ConNOC: A Practical Timing Channel Attack on Network-on-chip Hardware in a Multicore Processor. |
HOST |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Sofiane Takarabt, Sylvain Guilley, Youssef Souissi, Khaled Karray, Laurent Sauvage, Yves Mathieu |
Formal Evaluation and Construction of Glitch-resistant Masked Functions. |
HOST |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Honggang Yu, Haocheng Ma, Kaichen Yang, Yiqiang Zhao, Yier Jin |
DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Keyvan Ramezanpour, Paul Ampadu, William Diehl |
RS-Mask: Random Space Masking as an Integrated Countermeasure against Power and Fault Analysis. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Calvin Deutschbein, Cynthia Sturton |
Evaluating Security Specification Mining for a CISC Architecture. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Lauren Biernacki, Mark Gallagher 0003, Valeria Bertacco, Todd M. Austin |
Thwarting Control Plane Attacks with Displaced and Dilated Address Spaces. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | M. Tanjidur Rahman, Shahin Tajik, M. Sazadur Rahman, Mark M. Tehranipoor, Navid Asadizanjani |
The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Hristozov, Manuel Huber 0001, Georg Sigl |
Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Toufique Morshed, Md Momin Al Aziz, Noman Mohammed |
CPU and GPU Accelerated Fully Homomorphic Encryption. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Wei Yan 0005, Huifeng Zhu, Zhiyuan Yu, Fatemeh Tehranipoor, John A. Chandy, Ning Zhang 0017, Xuan Zhang 0001 |
Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yuan Yao, Tarun Kathuria, Baris Ege, Patrick Schaumont |
Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Rashmi S. Agrawal 0001, Lake Bu, Michel A. Kinsy |
A Post-Quantum Secure Discrete Gaussian Noise Sampler. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed A. Ayoub, Mark D. Aagaard |
Application-Specific Instruction Set Architecture for an Ultralight Hardware Security Module. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Antoine Loiseau, Maxime Lecomte, Jacques J. A. Fournier |
Template Attacks against ECC: practical implementation against Curve25519. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Michael Gruber, Matthias Probst, Michael Tempelmeier |
Statistical Ineffective Fault Analysis of GIMLI. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | |
2020 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, San Jose, CA, USA, December 7-11, 2020 |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Martin S. Kelly, Keith Mayes |
High Precision Laser Fault Injection using Low-cost Components. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Joseph Sweeney, V. Mohammed Zackriya, Samuel Pagliarini, Lawrence T. Pileggi |
Latch-Based Logic Locking. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Zihao Zhan, Zhenkai Zhang, Xenofon D. Koutsoukos |
BitJabber: The World's Fastest Electromagnetic Covert Channel. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Ye Wang 0014, Xiaodan Xi, Michael Orshansky |
Lattice PUF: A Strong Physical Unclonable Function Provably Secure against Machine Learning Attacks. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Victor Arribas, Felix Wegener, Amir Moradi 0001, Svetla Nikova |
Cryptographic Fault Diagnosis using VerFI. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Franz-Josef Streit, Florian Fritz, Andreas Becher, Stefan Wildermann, Stefan Werner, Martin Schmidt-Korth, Michael Pschyklenk, Jürgen Teich |
Secure Boot from Non-Volatile Memory for Programmable SoC Architectures. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Aikata, Banashri Karmakar, Dhiman Saha |
DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Hettwer, Tobias Horn, Stefan Gehrer, Tim Güneysu |
Encoding Power Traces as Images for Efficient Side-Channel Analysis. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Elmira Karimi, Yunsi Fei, David R. Kaeli |
Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Mahmoud Khalafalla, Mahmoud A. Elmohr, Catherine H. Gebotys |
Going Deep: Using deep learning techniques with simplified mathematical models against XOR BR and TBR PUFs (Attacks and Countermeasures). |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Anuj Dubey, Rosario Cammarota, Aydin Aysu |
MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Rabin Yu Acharya, Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte |
Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Orlando Arias, Dean Sullivan, Haoqi Shan, Yier Jin |
LAHEL: Lightweight Attestation Hardening Embedded Devices using Macrocells. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Luong N. Nguyen, Baki Berkay Yilmaz, Milos Prvulovic, Alenka G. Zajic |
A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan Detection. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Arsath K. F, Vinod Ganesan, Rahul Bodduna, Chester Rebeiro |
PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Bashir M. Sabquat Bahar Talukder, Vineetha Menon, Biswajit Ray, Tempestt J. Neal, Md. Tauhidur Rahman 0001 |
Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Rachel Selina Rajarathnam, Yibo Lin, Yier Jin, David Z. Pan |
ReGDS: A Reverse Engineering Framework from GDSII to Gate-level Netlist. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Brice Colombier, Alexandre Menu, Jean-Max Dutertre, Pierre-Alain Moëllic, Jean-Baptiste Rigaud, Jean-Luc Danger |
Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Keyvan Ramezanpour, Paul Ampadu, William Diehl |
A Statistical Fault Analysis Methodology for the Ascon Authenticated Cipher. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Adam Duncan, Grant Skipper, Andrew Stern, Adib Nahiyan, Fahim Rahman, Andrew Lukefahr, Mark M. Tehranipoor, Martin Swany |
FLATS: Filling Logic and Testing Spatially for FPGA Authentication and Tamper Detection. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Michael Tempelmeier, Maximilian Werner, Georg Sigl |
Using Hardware Software Codesign for Optimised Implementations of High-Speed and Defence in Depth CAESAR Finalists. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | |
IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2019, McLean, VA, USA, May 5-10, 2019 |
HOST |
2019 |
DBLP BibTeX RDF |
|
1 | Michaela Brunner, Johanna Baehr, Georg Sigl |
Improving on State Register Identification in Sequential Hardware Reverse Engineering. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Tim Fritzmann, Johanna Sepúlveda |
Efficient and Flexible Low-Power NTT for Lattice-Based Cryptography. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | M. Sadegh Riazi, Mojan Javaheripi, Siam U. Hussain, Farinaz Koushanfar |
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Suyuan Chen, Ranga Vemuri |
Exploiting Proximity Information in a Satisfiability Based Attack Against Split Manufactured Circuits. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Qihang Shi, Nidish Vashistha, Hangwei Lu, Hao-Ting Shen, Bahar Tehranipoor, Damon L. Woodard, Navid Asadizanjani |
Golden Gates: A New Hybrid Approach for Rapid Hardware Trojan Detection using Testing and Imaging. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Prabuddha Chakraborty, Jonathan Cruz 0001, Swarup Bhunia |
SURF: Joint Structural Functional Attack on Logic Locking. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Nabeel 0001, Mohammed Ashraf, Eduardo Chielle, Nektarios Georgios Tsoutsos, Michail Maniatakos |
CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Shijia Wei, Aydin Aysu, Michael Orshansky, Andreas Gerstlauer, Mohit Tiwari |
Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Manaar Alam, Sarani Bhattacharya, Swastika Dutta, Sayan Sinha, Debdeep Mukhopadhyay, Anupam Chattopadhyay |
RATAFIA: Ransomware Analysis using Time And Frequency Informed Autoencoders. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Kaveh Shamsi, David Z. Pan, Yier Jin |
On the Impossibility of Approximation-Resilient Circuit Locking. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Chiou-Yng Lee, Jiafeng Xie |
High Capability and Low-Complexity: Novel Fault Detection Scheme for Finite Field Multipliers over GF(2m) based on MSPB. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Dinu, Archanaa S. Krishnan, Patrick Schaumont |
SIA: Secure Intermittent Architecture for Off-the-Shelf Resource-Constrained Microcontrollers. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Nikhil Chawla, Arvind Singh, Nael Mizanur Rahman, Monodeep Kar, Saibal Mukhopadhyay |
Extracting Side-Channel Leakage from Round Unrolled Implementations of Lightweight Ciphers. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Herkle, Holger Mandry, Joachim Becker, Maurits Ortmanns |
In-depth Analysis and Enhancements of RO-PUFs with a Partial Reconfiguration Framework on Xilinx Zynq-7000 SoC FPGAs. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ge Li, Vishnuvardhan V. Iyer, Michael Orshansky |
Securing AES against Localized EM Attacks through Spatial Randomization of Dataflow. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ujjwal Guin, Wendong Wang, Charles Harper, Adit D. Singh |
Detecting Recycled SoCs by Exploiting Aging Induced Biases in Memory Cells. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Karthikeyan Nagarajan, Mohammad Nasim Imtiaz Khan, Swaroop Ghosh |
ENTT: A Family of Emerging NVM-based Trojan Triggers. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Debayan Das, Mayukh Nath, Baibhab Chatterjee, Santosh Ghosh, Shreyas Sen |
STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Cronin, Chengmo Yang |
A Fetching Tale: Covert Communication with the Hardware Prefetcher. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Fan Yao, Hongyu Fang, Milos Doroslovacki, Guru Venkataramani |
COTSknight: Practical Defense against Cache Timing Channel Attacks using Cache Monitoring and Partitioning Technologies. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Xiaolong Guo, Raj Gautam Dutta, Jiaji He, Mark M. Tehranipoor, Yier Jin |
QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment. |
HOST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Adam Duncan, Lei Jiang 0001, Martin Swany |
Repurposing SoC analog circuitry for additional COTS hardware security. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Wenjie Che, Manel MartÃnez-Ramón, Fareena Saqib, Jim Plusquellic |
Delay model and machine learning exploration of a hardware-embedded delay PUF. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Asmit De, Anirudh Iyengar, Mohammad Nasim Imtiaz Khan, Sung-Hao Lin, Sandeep Krishna Thirumala, Swaroop Ghosh, Sumeet Kumar Gupta |
CTCG: Charge-trap based camouflaged gates for reverse engineering prevention. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Preeti Kumari, Bashir M. Sabquat Bahar Talukder, Sadman Sakib, Biswajit Ray, Md. Tauhidur Rahman 0001 |
Independent detection of recycled flash memory: Challenges and solutions. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Md. Badruddoja Majumder, Md Sakib Hasan, Mesbah Uddin, Garrett S. Rose |
Chaos computing for mitigating side channel attack. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Arvind Singh, Nikhil Chawla, Monodeep Kar, Saibal Mukhopadhyay |
Energy efficient and side-channel secure hardware architecture for lightweight cipher SIMON. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Cronin, Chengmo Yang |
Lowering the barrier to online malware detection through low frequency sampling of HPCs. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Aydin Aysu, Youssef Tobah, Mohit Tiwari, Andreas Gerstlauer, Michael Orshansky |
Horizontal side-channel vulnerabilities of post-quantum key exchange protocols. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Baibhab Chatterjee, Debayan Das, Shreyas Sen |
RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Vincent Immler, Johannes Obermaier, Martin König, Matthias Hiller, Georg Sigl |
B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Elena Dubrova, Maxim Teslenko |
An efficient SAT-based algorithm for finding short cycles in cryptographic algorithms. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Rami Sheikh, Ro Cammarota, Wenjia Ruan |
Value prediction for security (VPsec): Countering fault attacks in modern microprocessors. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Nader Sehatbakhsh, Monjur Alam, Alireza Nazari, Alenka G. Zajic, Milos Prvulovic |
Syndrome: Spectral analysis for anomaly detection on medical IoT and embedded devices. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yuan Yao, Mo Yang, Conor Patrick, Bilgiday Yuce, Patrick Schaumont |
Fault-assisted side-channel analysis of masked implementations. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj |
Comparison of cost of protection against differential power analysis of selected authenticated ciphers. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Zhiming Zhang, Qiaoyan Yu, Laurent Njilla, Charles A. Kamhoua |
FPGA-oriented moving target defense against security threats from malicious FPGA tools. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Nikolay Matyunin, Jakub Szefer, Stefan Katzenbeisser 0001 |
Zero-permission acoustic cross-device tracking. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Nail Etkin Can Akkaya, Burak Erbagci, Ken Mai |
Secure chip odometers using intentional controlled aging. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Mengmei Ye, Jonathan Sherman, Witawas Srisa-an, Sheng Wei 0001 |
TZSlicer: Security-aware dynamic program slicing for hardware isolation. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yumin Hou, Hu He 0001, Kaveh Shamsi, Yier Jin, Dong Wu, Huaqiang Wu |
R2D2: Runtime reassurance and detection of A2 Trojan. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Kai Yang 0028, Jungmin Park, Mark M. Tehranipoor, Swarup Bhunia |
Hardware virtualization for protection against power analysis attack. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | |
2018 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018, Washington, DC, USA, April 30 - May 4, 2018 |
HOST |
2018 |
DBLP BibTeX RDF |
|
1 | Shahrzad Keshavarz, Falk Schellenberg, Bastian Richter 0001, Christof Paar, Daniel E. Holcomb |
SAT-based reverse engineering of gate-level schematics using fault injection and probing. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Mahabubul Alam, Sreeja Chowdhury, Mark M. Tehranipoor, Ujjwal Guin |
Robust, low-cost, and accurate detection of recycled ICs using digital signatures. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Tao Liu 0023, Wujie Wen, Yier Jin |
SIN2: Stealth infection on neural network - A low-cost agile neural Trojan attack methodology. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Goutham Pocklassery, Wenjie Che, Fareena Saqib, Matthew Areno, Jim Plusquellic |
Self-authenticating secure boot for FPGAs. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xiaodan Xi, Aydin Aysu, Michael Orshansky |
Fresh re-keying with strong PUFs: A new approach to side-channel security. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hongxiang Gu, Miodrag Potkonjak |
Securing interconnected PUF network with reconfigurability. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Michael Tempelmeier, Fabrizio De Santis, Georg Sigl, Jens-Peter Kaps |
The CAESAR-API in the real world - Towards a fair evaluation of hardware CAESAR candidates. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hongyu Fang, Sai Santosh Dayapule, Fan Yao, Milos Doroslovacki, Guru Venkataramani |
Prefetch-guard: Leveraging hardware prefetches to defend against cache timing channels. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Robert Specht, Vincent Immler, Florian Unterstein, Johann Heyszl, Georg Sigl |
Dividing the threshold: Multi-probe localized EM analysis on threshold implementations. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin |
Protecting block ciphers against differential fault attacks without re-keying. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jacob Couch, Nicole Whewell, Andrew Monica, Stergios Papadakis |
Direct read of idle block RAM from FPGAs utilizing photon emission microscopy. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Athanassios Moschos, Apostolos P. Fournaris, Odysseas G. Koufopavlou |
A flexible leakage trace collection setup for arbitrary cryptographic IP cores. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Robert Hesselbarth, Florian Wilde, Chongyan Gu, Neil Hanley |
Large scale RO PUF analysis over slice type, evaluation time and temperature on 28nm Xilinx FPGAs. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Junko Takahashi, Masashi Tanaka, Hitoshi Fuji, Toshio Narita, Shunsuke Matsumoto, Hiroki Sato |
Abnormal vehicle behavior induced using only fabricated informative CAN messages. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 510 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|