Abstract is missing.
- Robust privacy-preserving fingerprint authenticationYe Zhang, Farinaz Koushanfar. 1-6 [doi]
- UCR: An unclonable chipless RFID tagKun Yang, Domenic Forte, Mark Mohammad Tehranipoor. 7-12 [doi]
- A highly reliable and tamper-resistant RRAM PUF: Design and experimental validationRui Liu, Huaqiang Wu, Yachun Pang, He Qian, Shimeng Yu. 13-18 [doi]
- Machine learning resistant strong PUF: Possible or a pipe dream?Arunkumar Vijayakumar, Vinay C. Patil, Charles B. Prado, Sandip Kundu. 19-24 [doi]
- LEDPUF: Stability-guaranteed physical unclonable functions through locally enhanced defectivityWei-Che Wang, Yair Yona, Suhas N. Diggavi, Puneet Gupta. 25-30 [doi]
- Parsimonious design strategy for linear layers with high diffusion in block ciphersSikhar Patranabis, Debapriya Basu Roy, Yash Shrivastava, Debdeep Mukhopadhyay, Santosh Ghosh. 31-36 [doi]
- Iterating Von Neumann's post-processing under hardware constraintsVladimir Rozic, Bohan Yang 0001, Wim Dehaene, Ingrid Verbauwhede. 37-42 [doi]
- Controlling your control flow graphArun K. Kanuparthi, Jeyavijayan Rajendran, Ramesh Karri. 43-48 [doi]
- An area-optimized serial implementation of ICEPOLE authenticated encryption schemesMichael Tempelmeier, Fabrizio De Santis, Jens-Peter Kaps, Georg Sigl. 49-54 [doi]
- Round gating for low energy block ciphersSubhadeep Banik, Andrey Bogdanov, Francesco Regazzoni, Takanori Isobe, Harunaga Hiwatari, Toru Akishita. 55-60 [doi]
- Functional polymorphism for intellectual property protectionJeffrey Todd McDonald, Yong C. Kim, Todd R. Andel, Miles A. Forbes, James McVicar. 61-66 [doi]
- The Conjoined MicroprocessorEhsan Aerabi, A. Elhadi Amirouche, Houda Ferradi, Rémi Géraud, David Naccache, Jean Vuillemin. 67-70 [doi]
- Low-area hardware implementations of CLOC, SILC and AES-OTRSubhadeep Banik, Andrey Bogdanov, Kazuhiko Minematsu. 71-74 [doi]
- Functional block identification in circuit design recoveryJacob Couch, Elizabeth Reilly, Morgan Schuyler, Bradley Barrett. 75-78 [doi]
- Robust hardware true random number generators using DRAM remanence effectsFatemeh Tehranipoor, Wei Yan, John A. Chandy. 79-84 [doi]
- Blinded random corruption attacksRodrigo Branco, Shay Gueron. 85-90 [doi]
- Trust games: How game theory can guide the development of hardware Trojan detection methodsJonathan Graf. 91-96 [doi]
- ACBuilder: A tool for hardware architecture security evaluationHenrique Kawakami, David Ott, Hao Chi Wong, Ricardo Dahab, Roberto Gallo. 97-102 [doi]
- On the problems of realizing reliable and efficient ring oscillator PUFs on FPGAsAlexander Wild, Georg T. Becker, Tim Güneysu. 103-108 [doi]
- Model checking to find vulnerabilities in an instruction set architectureChris Bradfield, Cynthia Sturton. 109-113 [doi]
- SDSM: Fast and scalable security support for directory-based distributed shared memoryOfir Shwartz, Yitzhak Birk. 114-119 [doi]
- Adaptive real-time Trojan detection framework through machine learningAmey M. Kulkarni, Youngok Pino, Tinoosh Mohsenin. 120-123 [doi]
- Scalable SoC trust verification using integrated theorem proving and model checkingXiaolong Guo, Raj Gautam Dutta, Prabhat Mishra, Yier Jin. 124-129 [doi]
- Information leakage behind the curtain: Abusing anti-EMI features for covert communicationJohannes Bauer, Sebastian Schinzel, Felix C. Freiling, Andreas Dewald. 130-134 [doi]
- Granularity and detection capability of an adaptive embedded Hardware Trojan detection systemMaxime Lecomte, Jacques J. A. Fournier, Philippe Maurine. 135-138 [doi]
- Electronic forensic techniques for manufacturer attributionRyan L. Helinski, Edward I. Cole, Gideon Robertson, Jonathan Woodbridge, Lyndon G. Pierson. 139-144 [doi]
- Integrated all-digital low-dropout regulator as a countermeasure to power attack in encryption enginesA. Singh, M. Kar, A. Rajan, V. De, S. Mukhopadhyay. 145-148 [doi]
- CryptoML: Secure outsourcing of big data machine learning applicationsAzalia Mirhoseini, Ahmad-Reza Sadeghi, Farinaz Koushanfar. 149-154 [doi]
- A layout-driven framework to assess vulnerability of ICs to microprobing attacksQihang Shi, Navid Asadizanjani, Domenic Forte, Mark Mohammad Tehranipoor. 155-160 [doi]
- A new approach for rowhammer attacksRui Qiao, Mark Seaborn. 161-166 [doi]
- Hardware-based workload forensics: Process reconstruction via TLB monitoringLiwei Zhou, Yiorgos Makris. 167-172 [doi]
- A key-centric processor architecture for secure computingDavid Whelihan, Kate Thurmer, Michael Vai. 173-178 [doi]
- Hardware security risk assessment: A case studyBrent Sherman, David Wheeler. 179-184 [doi]
- A novel security technique to generate truly random and highly reliable reconfigurable ROPUF-based cryptographic keysFathi Amsaad, Atul Prasad, Chayanika Roychaudhuri, Mohammed Niamat. 185-190 [doi]
- A zero-cost approach to detect recycled SoC chips using embedded SRAMZimu Guo, Md. Tauhidur Rahman, Mark Mohammad Tehranipoor, Domenic Forte. 191-196 [doi]
- Redirecting DRAM memory pages: Examining the threat of system memory Hardware TrojansBradley D. Hopkins, John Shield, Chris J. North. 197-202 [doi]
- Large laser spots and fault sensitivity analysisFalk Schellenberg, Markus Finkeldey, Nils Gerhardt, Martin Hofmann, Amir Moradi 0001, Christof Paar. 203-208 [doi]
- The other side of the coin: Analyzing software encoding schemes against fault injection attacksJakub Breier, Dirmanto Jap, Shivam Bhasin. 209-216 [doi]
- IP core protection using voltage-controlled side-channel receiversPeter Samarin, Kerstin Lemke-Rust, Christof Paar. 217-222 [doi]
- A separation and protection scheme for on-chip memory blocks in FPGAsLuis Ramirez Rivera, Xiaofang Wang, Danai Chasaki. 223-228 [doi]
- A secure camouflaged threshold voltage defined logic familyBurak Erbagci, Cagri Erbagci, Nail Etkin Can Akkaya, Ken Mai. 229-235 [doi]
- SARLock: SAT attack resistant logic lockingMuhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan J. V. Rajendran, Ozgur Sinanoglu. 236-241 [doi]
- Template attacks using classification algorithmsElif Ozgen, Louiza Papachristodoulou, Lejla Batina. 242-247 [doi]
- GenMatch: Secure DNA compatibility testingM. Sadegh Riazi, Neeraj K. R. Dantu, L. N. Vinay Gattu, Farinaz Koushanfar. 248-253 [doi]