Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Richa Agrawal, Ranga Vemuri |
On state encoding against power analysis attacks for finite state controllers. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Carpent, Norrathep Rattanavipanon, Gene Tsudik |
Remote attestation of IoT devices via SMARM: Shuffled measurements against roving malware. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Prashanth Mohan, Nail Etkin Can Akkaya, Burak Erbagci, Ken Mai |
A compact energy-efficient pseudo-static camouflaged logic family. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001, Takanori Isobe 0001, Harunaga Hiwatari, Toru Akishita |
Inverse gating for low energy encryption. |
HOST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Kiruba Sankaran Subramani, Angelos Antonopoulos 0002, Ahmed Attia Abotabl, Aria Nosratinia, Yiorgos Makris |
INFECT: INconspicuous FEC-based Trojan: A hardware attack on an 802.11a/g wireless network. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Vinay C. Patil, Arunkumar Vijayakumar, Daniel E. Holcomb, Sandip Kundu |
Improving reliability of weak PUFs via circuit techniques to enhance mismatch. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu |
LWE-based lossless computational fuzzy extractor for the Internet of Things. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Broadfoot, Carl Sechen, Jeyavijayan (JV) Rajendran |
On designing optimal camouflaged layouts. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hoda Maleki, Reza Rahaeimehr, Chenglu Jin, Marten van Dijk |
New clone-detection approach for RFID-based supply chains. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Asmit De, Swaroop Ghosh |
Threshold voltage defined multi-input complex gates. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mostafa M. I. Taha, Arash Reyhani-Masoleh, Patrick Schaumont |
Stateless leakage resiliency from NLFSRs. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty |
Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001 |
Efficient configurations for block ciphers with unified ENC/DEC paths. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jaya Dofe, Qiaoyan Yu |
Analyzing security vulnerabilities of three-dimensional integrated circuits. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Joseph McMahan, Weilong Cui, Liang Xia, Jeff Heckey, Frederic T. Chong, Timothy Sherwood |
Challenging on-chip SRAM security with boot-state statistics. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Leonid Azriel, Shahar Kvatinsky |
Towards a memristive hardware secure hash function (MemHash). |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Vincent Immler, Matthias Hiller, Johannes Obermaier, Georg Sigl |
Take a moment and have some t: Hypothesis testing on raw PUF data. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Joseph Sagisi, Joseph G. Tront, Randy C. Marchany |
Platform agnostic, scalable, and unobtrusive FPGA network processor design of moving target defense over IPv6 (MT6D) over IEEE 802.3 Ethernet. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alexandres Andreou, Andrey Bogdanov, Elmar Tischhauser |
Cache timing attacks on recent microarchitectures. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Peter Samarin, Kerstin Lemke-Rust |
Detection of counterfeit ICs using public identification sequences. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Martin S. Kelly, Keith Mayes, John F. Walker |
Characterising a CPU fault attack model via run-time data analysis. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Goutham Pocklassery, Venkata K. Kajuruli, James F. Plusquellic, Fareena Saqib |
Physical unclonable functions and dynamic partial reconfiguration for security in resource-constrained embedded systems. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ye Yuan 0005, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi |
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Elad Carmon, Jean-Pierre Seifert, Avishai Wool |
Photonic side channel attacks against RSA. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | André Schaller, Wenjie Xiong 0001, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser 0001, Jakub Szefer |
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Taimour Wehbe, Vincent John Mooney, Abdul Qadir Javaid, Omer T. Inan |
A novel physiological features-assisted architecture for rapidly distinguishing health problems from hardware Trojan attacks and errors in medical devices. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mitsuru Shiozaki, Takaya Kubota, Masashi Nakano, Yuuki Nakazawa, Takeshi Fujino |
Malicious CAN-message attack against advanced driving assistant system. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Yun Dai, Robert K. Brayton |
Circuit recognition with deep learning. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | |
2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017, McLean, VA, USA, May 1-5, 2017 |
HOST |
2017 |
DBLP BibTeX RDF |
|
1 | Abhishek Chakraborty 0001, Ankit Mondal, Ankur Srivastava 0001 |
Correlation power analysis attack against STT-MRAM based cyptosystems. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Michel A. Kinsy, Shreeya Khadka, Mihailo Isakov, Anam Farrukh |
Hermes: Secure heterogeneous multicore architecture design. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zelalem Birhanu Aweke, Todd M. Austin |
Øzone: Efficient execution with zero timing leakage for modern microarchitectures. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Andrew M. Smith, Jackson R. Mayo, Vivian Kammler, Robert C. Armstrong, Yevgeniy Vorobeychik |
Using computational game theory to guide verification and security in hardware designs. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu |
TTLock: Tenacious and traceless logic locking. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Debayan Das, Shovan Maity, Saad Bin Nasir, Santosh Ghosh, Arijit Raychowdhury, Shreyas Sen |
High efficiency power side-channel attack immunity using noise injection in attenuated signature domain. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kaveh Shamsi, Meng Li 0004, Travis Meade, Zheng Zhao 0003, David Z. Pan, Yier Jin |
AppSAT: Approximately deobfuscating integrated circuits. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Michael Theodorides, David A. Wagner 0001 |
Breaking active-set backward-edge CFI. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kanad Sinha, Vasileios P. Kemerlis, Simha Sethumadhavan |
Reviving instruction set randomization. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Tara Merin John, Syed Kamran Haider, Hamza Omar, Marten van Dijk |
Connecting the dots: Privacy leakage via write-access patterns to the main memory. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wenjie Che, Jim Plusquellic, Fareena Saqib |
A novel offset method for improving bitstring quality of a Hardware-Embedded delay PUF. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Vaibhav Venugopal Rao, Ioannis Savidis |
Parameter biasing obfuscation for analog IP protection. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Bobda, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla |
Synthesis of hardware sandboxes for Trojan mitigation in systems on chip. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Michael Vai, Karen Gettings, Theodore Lyszczarz |
Fabrication security and trust of domain-specific ASIC processors. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chongxi Bao, Ankur Srivastava 0001 |
Exploring timing side-channel attacks on path-ORAMs. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Aydin Aysu, Ye Wang 0014, Patrick Schaumont, Michael Orshansky |
A new maskless debiasing method for lightweight physical unclonable functions. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zhaoying Hu, Shu-Jen Han |
Creating security primitive by nanoscale manipulation of carbon nanotubes. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Bertrand Cambou, Fatemeh Afghah, Derek Sonderegger, Jennifer Taggart, Hugh J. Barnaby, Michael N. Kozicki |
Ag conductive bridge RAMs for physical unclonable functions. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Troy Bryant, Sreeja Chowdhury, Domenic Forte, Mark M. Tehranipoor, Nima Maghari |
A stochastic all-digital weak physically unclonable function for analog/mixed-signal applications. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Brian Koziel, Reza Azarderakhsh, David Jao |
On secure implementations of quantum-resistant supersingular isogeny Diffie-Hellman. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Misiker Tadesse Aga, Zelalem Birhanu Aweke, Todd M. Austin |
When good protections go bad: Exploiting anti-DoS measures to accelerate rowhammer attacks. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Magnus Sundal, Ricardo Chaves |
Improving FPGA based SHA-3 structures. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl |
Automatic generation of high-performance modular multipliers for arbitrary mersenne primes on FPGAs. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chris Pavlina, Jacob Torrey, Kyle Temkin |
Abstract: Characterizing EEPROM for usage as a ubiquitous PUF source. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Maxime Lecomte, Jacques J. A. Fournier, Philippe Maurine |
Granularity and detection capability of an adaptive embedded Hardware Trojan detection system. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Elif Ozgen, Louiza Papachristodoulou, Lejla Batina |
Template attacks using classification algorithms. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Zimu Guo, Md. Tauhidur Rahman 0001, Mark M. Tehranipoor, Domenic Forte |
A zero-cost approach to detect recycled SoC chips using embedded SRAM. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Xiaolong Guo, Raj Gautam Dutta, Prabhat Mishra 0001, Yier Jin |
Scalable SoC trust verification using integrated theorem proving and model checking. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Rui Liu 0005, Huaqiang Wu, Yachun Pang, He Qian, Shimeng Yu |
A highly reliable and tamper-resistant RRAM PUF: Design and experimental validation. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | David Whelihan, Kate Thurmer, Michael Vai |
A key-centric processor architecture for secure computing. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Luis Ramirez Rivera, Xiaofang Wang, Danai Chasaki |
A separation and protection scheme for on-chip memory blocks in FPGAs. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Peter Samarin, Kerstin Lemke-Rust, Christof Paar |
IP core protection using voltage-controlled side-channel receivers. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Michael Tempelmeier, Fabrizio De Santis, Jens-Peter Kaps, Georg Sigl |
An area-optimized serial implementation of ICEPOLE authenticated encryption schemes. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fathi Amsaad 0001, Atul Prasad, Chayanika Roychaudhuri, Mohammed Y. Niamat |
A novel security technique to generate truly random and highly reliable reconfigurable ROPUF-based cryptographic keys. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Qihang Shi, Navid Asadizanjani, Domenic Forte, Mark M. Tehranipoor |
A layout-driven framework to assess vulnerability of ICs to microprobing attacks. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Arun K. Kanuparthi, Jeyavijayan Rajendran, Ramesh Karri |
Controlling your control flow graph. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Bradley D. Hopkins, John Shield, Chris North 0002 |
Redirecting DRAM memory pages: Examining the threat of system memory Hardware Trojans. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jacob Couch, Elizabeth Reilly, Morgan Schuyler, Bradley Barrett |
Functional block identification in circuit design recovery. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Subhadeep Banik, Andrey Bogdanov, Kazuhiko Minematsu |
Low-area hardware implementations of CLOC, SILC and AES-OTR. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | M. Sadegh Riazi, Neeraj K. R. Dantu, L. N. Vinay Gattu, Farinaz Koushanfar |
GenMatch: Secure DNA compatibility testing. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ryan L. Helinski, Edward I. Cole, Gideon Robertson, Jonathan Woodbridge, Lyndon G. Pierson |
Electronic forensic techniques for manufacturer attribution. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Chris Bradfield, Cynthia Sturton |
Model checking to find vulnerabilities in an instruction set architecture. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Rui Qiao, Mark Seaborn |
A new approach for rowhammer attacks. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Arunkumar Vijayakumar, Vinay C. Patil, Charles B. Prado, Sandip Kundu |
Machine learning resistant strong PUF: Possible or a pipe dream? |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Wei-Che Wang, Yair Yona, Suhas N. Diggavi, Puneet Gupta 0001 |
LEDPUF: Stability-guaranteed physical unclonable functions through locally enhanced defectivity. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Azalia Mirhoseini, Ahmad-Reza Sadeghi, Farinaz Koushanfar |
CryptoML: Secure outsourcing of big data machine learning applications. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Amey M. Kulkarni, Youngok K. Pino, Tinoosh Mohsenin |
Adaptive real-time Trojan detection framework through machine learning. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Burak Erbagci, Cagri Erbagci, Nail Etkin Can Akkaya, Ken Mai |
A secure camouflaged threshold voltage defined logic family. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Liwei Zhou, Yiorgos Makris |
Hardware-based workload forensics: Process reconstruction via TLB monitoring. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kun Yang, Domenic Forte, Mark M. Tehranipoor |
UCR: An unclonable chipless RFID tag. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu |
SARLock: SAT attack resistant logic locking. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Brent Sherman, David Wheeler |
Hardware security risk assessment: A case study. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ofir Shwartz, Yitzhak Birk |
SDSM: Fast and scalable security support for directory-based distributed shared memory. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fatemeh Tehranipoor, Wei Yan 0005, John A. Chandy |
Robust hardware true random number generators using DRAM remanence effects. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Wild, Georg T. Becker, Tim Güneysu |
On the problems of realizing reliable and efficient ring oscillator PUFs on FPGAs. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Graf |
Trust games: How game theory can guide the development of hardware Trojan detection methods. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ehsan Aerabi, A. Elhadi Amirouche, Houda Ferradi, Rémi Géraud, David Naccache, Jean Vuillemin |
The Conjoined Microprocessor. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Arvind Singh, Monodeep Kar, Anand Rajan, Vivek De, Saibal Mukhopadhyay |
Integrated all-digital low-dropout regulator as a countermeasure to power attack in encryption engines. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jakub Breier, Dirmanto Jap, Shivam Bhasin |
The other side of the coin: Analyzing software encoding schemes against fault injection attacks. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ye Zhang, Farinaz Koushanfar |
Robust privacy-preserving fingerprint authentication. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Rodrigo Branco, Shay Gueron |
Blinded random corruption attacks. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Falk Schellenberg, Markus Finkeldey, Nils Gerhardt, Martin Hofmann 0017, Amir Moradi 0001, Christof Paar |
Large laser spots and fault sensitivity analysis. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Henrique Kawakami, David Ott, Hao Chi Wong, Ricardo Dahab, Roberto Gallo |
ACBuilder: A tool for hardware architecture security evaluation. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Bauer 0004, Sebastian Schinzel, Felix C. Freiling, Andreas Dewald |
Information leakage behind the curtain: Abusing anti-EMI features for covert communication. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sikhar Patranabis, Debapriya Basu Roy, Yash Shrivastava, Debdeep Mukhopadhyay, Santosh Ghosh |
Parsimonious design strategy for linear layers with high diffusion in block ciphers. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Rozic, Bohan Yang 0001, Wim Dehaene, Ingrid Verbauwhede |
Iterating Von Neumann's post-processing under hardware constraints. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001, Takanori Isobe 0001, Harunaga Hiwatari, Toru Akishita |
Round gating for low energy block ciphers. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | William H. Robinson, Swarup Bhunia, Ryan Kastner (eds.) |
2016 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016, McLean, VA, USA, May 3-5, 2016 |
HOST |
2016 |
DBLP BibTeX RDF |
|
1 | Jeffrey Todd McDonald, Yong C. Kim, Todd R. Andel, Miles A. Forbes, James McVicar |
Functional polymorphism for intellectual property protection. |
HOST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Abhishek Chakraborty 0001, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay |
A practical DPA on Grain v1 using LS-SVM. |
HOST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Qian Wang 0022, An Wang 0001, Liji Wu, Gang Qu 0001, Guoshuang Zhang |
Template attack on masking AES based on fault sensitivity analysis. |
HOST |
2015 |
DBLP DOI BibTeX RDF |
|