4 | -- | 0 | Jörg Henkel. From-the-EiC_38_1 |
5 | -- | 6 | Siddharth Garg, Daniel E. Holcomb, Jeyavijayan J. V. Rajendran, Ahmad-Reza Sadeghi. Guest Editors' Introduction: Competing to Secure SoCs |
7 | -- | 13 | Nassim Corteggiani, Giovanni Camurati, Marius Muench, Sebastian Poeplau, Aurélien Francillon. SoC Security Evaluation: Reflections on Methodology and Tooling |
14 | -- | 21 | Mark Fischer, Fabian Langer, Johannes Mono, Clemens Nasenberg, Nils Albartus. Hardware Penetration Testing Knocks Your SoCs Off |
22 | -- | 29 | Mohammad-Mahdi Bidmeshki, Yunjie Zhang, Monir Zaman, Liwei Zhou, Yiorgos Makris. Hunting Security Bugs in SoC Designs: Lessons Learned |
30 | -- | 38 | Saumil Gogri, Priya Joshi, Prashant Vurikiti, Nicole Fern, Michael Quinn, Jonathan Valamehr. Texas A&M Hackin' Aggies' Security Verification Strategies for the 2019 Hack@DAC Competition |
39 | -- | 68 | Brian Crafton, Samuel Spetalnick, Yan Fang, Arijit Raychowdhury. Merged Logic and Memory Fabrics for Accelerating Machine Learning Workloads |
69 | -- | 77 | Seyed Mohammad Ali Zeinolabedin, Johannes Partzsch, Christian Mayr. Real-time Hardware Implementation of ARM CoreSight Trace Decoder |
79 | -- | 80 | Tulika Mitra, Andreas Gerstlauer. Report on the 2020 Embedded Systems Week (ESWEEK): A Virtual Event during a Pandemic, September 20-25 |
81 | -- | 82 | Theo Theocharides. TTTC Newsletter Jan Feb 2021 |
84 | -- | 0 | Scott Davidson. Hacking in the Dark |