The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "HOST"( http://dblp.L3S.de/Venues/HOST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/host

Publication years (Num. hits)
2008 (23) 2009 (18) 2010 (25) 2011 (31) 2012 (26) 2013 (27) 2014 (31) 2015 (31) 2016 (45) 2017 (49) 2018 (40) 2019 (26) 2020 (31) 2021 (29) 2022 (47) 2023 (31)
Publication types (Num. hits)
inproceedings(494) proceedings(16)
Venues (Conferences, Journals, ...)
HOST(510)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 510 publication records. Showing 510 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Yinghua Hu, Yuke Zhang, Kaixin Yang, Dake Chen, Peter A. Beerel, Pierluigi Nuzzo 0002 Fun-SAT: Functional Corruptibility-Guided SAT-Based Attack on Sequential Logic Encryption. Search on Bibsonomy HOST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jingtao Li, Zhezhi He, Adnan Siraj Rakin, Deliang Fan, Chaitali Chakrabarti NeurObfuscator: A Full-stack Obfuscation Tool to Mitigate Neural Architecture Stealing. Search on Bibsonomy HOST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hansika Weerasena, Subodha Charles, Prabhat Mishra 0001 Lightweight Encryption Using Chaffing and Winnowing with All-or-Nothing Transform for Network-on-Chip Architectures. Search on Bibsonomy HOST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Austin Harris 0001, Tarunesh Verma, Shijia Wei, Lauren Biernacki, Alex Kisil, Misiker Tadesse Aga, Valeria Bertacco, Baris Kasikci, Mohit Tiwari, Todd M. Austin Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and Hardware. Search on Bibsonomy HOST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Shih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, Mohammad Abdullah Al Faruque HW2VEC: a Graph Learning Tool for Automating Hardware Security. Search on Bibsonomy HOST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Usman Ali, Omer Khan ConNOC: A Practical Timing Channel Attack on Network-on-chip Hardware in a Multicore Processor. Search on Bibsonomy HOST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sofiane Takarabt, Sylvain Guilley, Youssef Souissi, Khaled Karray, Laurent Sauvage, Yves Mathieu Formal Evaluation and Construction of Glitch-resistant Masked Functions. Search on Bibsonomy HOST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Honggang Yu, Haocheng Ma, Kaichen Yang, Yiqiang Zhao, Yier Jin DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Keyvan Ramezanpour, Paul Ampadu, William Diehl RS-Mask: Random Space Masking as an Integrated Countermeasure against Power and Fault Analysis. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Calvin Deutschbein, Cynthia Sturton Evaluating Security Specification Mining for a CISC Architecture. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lauren Biernacki, Mark Gallagher 0003, Valeria Bertacco, Todd M. Austin Thwarting Control Plane Attacks with Displaced and Dilated Address Spaces. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1M. Tanjidur Rahman, Shahin Tajik, M. Sazadur Rahman, Mark M. Tehranipoor, Navid Asadizanjani The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Stefan Hristozov, Manuel Huber 0001, Georg Sigl Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Toufique Morshed, Md Momin Al Aziz, Noman Mohammed CPU and GPU Accelerated Fully Homomorphic Encryption. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Wei Yan 0005, Huifeng Zhu, Zhiyuan Yu, Fatemeh Tehranipoor, John A. Chandy, Ning Zhang 0017, Xuan Zhang 0001 Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yuan Yao, Tarun Kathuria, Baris Ege, Patrick Schaumont Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rashmi S. Agrawal 0001, Lake Bu, Michel A. Kinsy A Post-Quantum Secure Discrete Gaussian Noise Sampler. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ahmed A. Ayoub, Mark D. Aagaard Application-Specific Instruction Set Architecture for an Ultralight Hardware Security Module. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Antoine Loiseau, Maxime Lecomte, Jacques J. A. Fournier Template Attacks against ECC: practical implementation against Curve25519. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Michael Gruber, Matthias Probst, Michael Tempelmeier Statistical Ineffective Fault Analysis of GIMLI. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1 2020 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, San Jose, CA, USA, December 7-11, 2020 Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Martin S. Kelly, Keith Mayes High Precision Laser Fault Injection using Low-cost Components. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Joseph Sweeney, V. Mohammed Zackriya, Samuel Pagliarini, Lawrence T. Pileggi Latch-Based Logic Locking. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zihao Zhan, Zhenkai Zhang, Xenofon D. Koutsoukos BitJabber: The World's Fastest Electromagnetic Covert Channel. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ye Wang 0014, Xiaodan Xi, Michael Orshansky Lattice PUF: A Strong Physical Unclonable Function Provably Secure against Machine Learning Attacks. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Victor Arribas, Felix Wegener, Amir Moradi 0001, Svetla Nikova Cryptographic Fault Diagnosis using VerFI. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Franz-Josef Streit, Florian Fritz, Andreas Becher, Stefan Wildermann, Stefan Werner, Martin Schmidt-Korth, Michael Pschyklenk, Jürgen Teich Secure Boot from Non-Volatile Memory for Programmable SoC Architectures. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Aikata, Banashri Karmakar, Dhiman Saha DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Benjamin Hettwer, Tobias Horn, Stefan Gehrer, Tim Güneysu Encoding Power Traces as Images for Efficient Side-Channel Analysis. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Elmira Karimi, Yunsi Fei, David R. Kaeli Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mahmoud Khalafalla, Mahmoud A. Elmohr, Catherine H. Gebotys Going Deep: Using deep learning techniques with simplified mathematical models against XOR BR and TBR PUFs (Attacks and Countermeasures). Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Anuj Dubey, Rosario Cammarota, Aydin Aysu MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rabin Yu Acharya, Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Orlando Arias, Dean Sullivan, Haoqi Shan, Yier Jin LAHEL: Lightweight Attestation Hardening Embedded Devices using Macrocells. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Luong N. Nguyen, Baki Berkay Yilmaz, Milos Prvulovic, Alenka G. Zajic A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan Detection. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Muhammad Arsath K. F, Vinod Ganesan, Rahul Bodduna, Chester Rebeiro PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Bashir M. Sabquat Bahar Talukder, Vineetha Menon, Biswajit Ray, Tempestt J. Neal, Md. Tauhidur Rahman 0001 Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rachel Selina Rajarathnam, Yibo Lin, Yier Jin, David Z. Pan ReGDS: A Reverse Engineering Framework from GDSII to Gate-level Netlist. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Brice Colombier, Alexandre Menu, Jean-Max Dutertre, Pierre-Alain Moëllic, Jean-Baptiste Rigaud, Jean-Luc Danger Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Keyvan Ramezanpour, Paul Ampadu, William Diehl A Statistical Fault Analysis Methodology for the Ascon Authenticated Cipher. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Adam Duncan, Grant Skipper, Andrew Stern, Adib Nahiyan, Fahim Rahman, Andrew Lukefahr, Mark M. Tehranipoor, Martin Swany FLATS: Filling Logic and Testing Spatially for FPGA Authentication and Tamper Detection. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Michael Tempelmeier, Maximilian Werner, Georg Sigl Using Hardware Software Codesign for Optimised Implementations of High-Speed and Defence in Depth CAESAR Finalists. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2019, McLean, VA, USA, May 5-10, 2019 Search on Bibsonomy HOST The full citation details ... 2019 DBLP  BibTeX  RDF
1Michaela Brunner, Johanna Baehr, Georg Sigl Improving on State Register Identification in Sequential Hardware Reverse Engineering. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tim Fritzmann, Johanna Sepúlveda Efficient and Flexible Low-Power NTT for Lattice-Based Cryptography. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1M. Sadegh Riazi, Mojan Javaheripi, Siam U. Hussain, Farinaz Koushanfar MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Suyuan Chen, Ranga Vemuri Exploiting Proximity Information in a Satisfiability Based Attack Against Split Manufactured Circuits. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Qihang Shi, Nidish Vashistha, Hangwei Lu, Hao-Ting Shen, Bahar Tehranipoor, Damon L. Woodard, Navid Asadizanjani Golden Gates: A New Hybrid Approach for Rapid Hardware Trojan Detection using Testing and Imaging. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Prabuddha Chakraborty, Jonathan Cruz 0001, Swarup Bhunia SURF: Joint Structural Functional Attack on Logic Locking. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohammed Nabeel 0001, Mohammed Ashraf, Eduardo Chielle, Nektarios Georgios Tsoutsos, Michail Maniatakos CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shijia Wei, Aydin Aysu, Michael Orshansky, Andreas Gerstlauer, Mohit Tiwari Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Manaar Alam, Sarani Bhattacharya, Swastika Dutta, Sayan Sinha, Debdeep Mukhopadhyay, Anupam Chattopadhyay RATAFIA: Ransomware Analysis using Time And Frequency Informed Autoencoders. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kaveh Shamsi, David Z. Pan, Yier Jin On the Impossibility of Approximation-Resilient Circuit Locking. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Chiou-Yng Lee, Jiafeng Xie High Capability and Low-Complexity: Novel Fault Detection Scheme for Finite Field Multipliers over GF(2m) based on MSPB. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Daniel Dinu, Archanaa S. Krishnan, Patrick Schaumont SIA: Secure Intermittent Architecture for Off-the-Shelf Resource-Constrained Microcontrollers. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nikhil Chawla, Arvind Singh, Nael Mizanur Rahman, Monodeep Kar, Saibal Mukhopadhyay Extracting Side-Channel Leakage from Round Unrolled Implementations of Lightweight Ciphers. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Andreas Herkle, Holger Mandry, Joachim Becker, Maurits Ortmanns In-depth Analysis and Enhancements of RO-PUFs with a Partial Reconfiguration Framework on Xilinx Zynq-7000 SoC FPGAs. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ge Li, Vishnuvardhan V. Iyer, Michael Orshansky Securing AES against Localized EM Attacks through Spatial Randomization of Dataflow. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ujjwal Guin, Wendong Wang, Charles Harper, Adit D. Singh Detecting Recycled SoCs by Exploiting Aging Induced Biases in Memory Cells. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Karthikeyan Nagarajan, Mohammad Nasim Imtiaz Khan, Swaroop Ghosh ENTT: A Family of Emerging NVM-based Trojan Triggers. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Debayan Das, Mayukh Nath, Baibhab Chatterjee, Santosh Ghosh, Shreyas Sen STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Patrick Cronin, Chengmo Yang A Fetching Tale: Covert Communication with the Hardware Prefetcher. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Fan Yao, Hongyu Fang, Milos Doroslovacki, Guru Venkataramani COTSknight: Practical Defense against Cache Timing Channel Attacks using Cache Monitoring and Partitioning Technologies. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Xiaolong Guo, Raj Gautam Dutta, Jiaji He, Mark M. Tehranipoor, Yier Jin QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment. Search on Bibsonomy HOST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Adam Duncan, Lei Jiang 0001, Martin Swany Repurposing SoC analog circuitry for additional COTS hardware security. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wenjie Che, Manel Martínez-Ramón, Fareena Saqib, Jim Plusquellic Delay model and machine learning exploration of a hardware-embedded delay PUF. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Asmit De, Anirudh Iyengar, Mohammad Nasim Imtiaz Khan, Sung-Hao Lin, Sandeep Krishna Thirumala, Swaroop Ghosh, Sumeet Kumar Gupta CTCG: Charge-trap based camouflaged gates for reverse engineering prevention. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Preeti Kumari, Bashir M. Sabquat Bahar Talukder, Sadman Sakib, Biswajit Ray, Md. Tauhidur Rahman 0001 Independent detection of recycled flash memory: Challenges and solutions. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Md. Badruddoja Majumder, Md Sakib Hasan, Mesbah Uddin, Garrett S. Rose Chaos computing for mitigating side channel attack. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Arvind Singh, Nikhil Chawla, Monodeep Kar, Saibal Mukhopadhyay Energy efficient and side-channel secure hardware architecture for lightweight cipher SIMON. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Patrick Cronin, Chengmo Yang Lowering the barrier to online malware detection through low frequency sampling of HPCs. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aydin Aysu, Youssef Tobah, Mohit Tiwari, Andreas Gerstlauer, Michael Orshansky Horizontal side-channel vulnerabilities of post-quantum key exchange protocols. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Baibhab Chatterjee, Debayan Das, Shreyas Sen RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vincent Immler, Johannes Obermaier, Martin König, Matthias Hiller, Georg Sigl B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Elena Dubrova, Maxim Teslenko An efficient SAT-based algorithm for finding short cycles in cryptographic algorithms. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rami Sheikh, Ro Cammarota, Wenjia Ruan Value prediction for security (VPsec): Countering fault attacks in modern microprocessors. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nader Sehatbakhsh, Monjur Alam, Alireza Nazari, Alenka G. Zajic, Milos Prvulovic Syndrome: Spectral analysis for anomaly detection on medical IoT and embedded devices. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yuan Yao, Mo Yang, Conor Patrick, Bilgiday Yuce, Patrick Schaumont Fault-assisted side-channel analysis of masked implementations. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj Comparison of cost of protection against differential power analysis of selected authenticated ciphers. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhiming Zhang, Qiaoyan Yu, Laurent Njilla, Charles A. Kamhoua FPGA-oriented moving target defense against security threats from malicious FPGA tools. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nikolay Matyunin, Jakub Szefer, Stefan Katzenbeisser 0001 Zero-permission acoustic cross-device tracking. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nail Etkin Can Akkaya, Burak Erbagci, Ken Mai Secure chip odometers using intentional controlled aging. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mengmei Ye, Jonathan Sherman, Witawas Srisa-an, Sheng Wei 0001 TZSlicer: Security-aware dynamic program slicing for hardware isolation. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yumin Hou, Hu He 0001, Kaveh Shamsi, Yier Jin, Dong Wu, Huaqiang Wu R2D2: Runtime reassurance and detection of A2 Trojan. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kai Yang 0028, Jungmin Park, Mark M. Tehranipoor, Swarup Bhunia Hardware virtualization for protection against power analysis attack. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1 2018 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018, Washington, DC, USA, April 30 - May 4, 2018 Search on Bibsonomy HOST The full citation details ... 2018 DBLP  BibTeX  RDF
1Shahrzad Keshavarz, Falk Schellenberg, Bastian Richter 0001, Christof Paar, Daniel E. Holcomb SAT-based reverse engineering of gate-level schematics using fault injection and probing. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mahabubul Alam, Sreeja Chowdhury, Mark M. Tehranipoor, Ujjwal Guin Robust, low-cost, and accurate detection of recycled ICs using digital signatures. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tao Liu 0023, Wujie Wen, Yier Jin SIN2: Stealth infection on neural network - A low-cost agile neural Trojan attack methodology. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Goutham Pocklassery, Wenjie Che, Fareena Saqib, Matthew Areno, Jim Plusquellic Self-authenticating secure boot for FPGAs. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiaodan Xi, Aydin Aysu, Michael Orshansky Fresh re-keying with strong PUFs: A new approach to side-channel security. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hongxiang Gu, Miodrag Potkonjak Securing interconnected PUF network with reconfigurability. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Michael Tempelmeier, Fabrizio De Santis, Georg Sigl, Jens-Peter Kaps The CAESAR-API in the real world - Towards a fair evaluation of hardware CAESAR candidates. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hongyu Fang, Sai Santosh Dayapule, Fan Yao, Milos Doroslovacki, Guru Venkataramani Prefetch-guard: Leveraging hardware prefetches to defend against cache timing channels. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Robert Specht, Vincent Immler, Florian Unterstein, Johann Heyszl, Georg Sigl Dividing the threshold: Multi-probe localized EM analysis on threshold implementations. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin Protecting block ciphers against differential fault attacks without re-keying. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jacob Couch, Nicole Whewell, Andrew Monica, Stergios Papadakis Direct read of idle block RAM from FPGAs utilizing photon emission microscopy. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Athanassios Moschos, Apostolos P. Fournaris, Odysseas G. Koufopavlou A flexible leakage trace collection setup for arbitrary cryptographic IP cores. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Robert Hesselbarth, Florian Wilde, Chongyan Gu, Neil Hanley Large scale RO PUF analysis over slice type, evaluation time and temperature on 28nm Xilinx FPGAs. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Junko Takahashi, Masashi Tanaka, Hitoshi Fuji, Toshio Narita, Shunsuke Matsumoto, Hiroki Sato Abnormal vehicle behavior induced using only fabricated informative CAN messages. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 510 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license