Journal: J. Hardware and Systems Security

Volume 1, Issue 4

297 -- 0Sandip Ray, Yier Jin. Guest Editorial: Security Challenges in the IoT Regime
298 -- 310Jakub Breier, Wei He, Dirmanto Jap, Shivam Bhasin, Anupam Chattopadhyay. Attacks in Reality: the Limits of Concurrent Error Detection Codes Against Laser Fault Injection
311 -- 327Mahabubul Alam, Mark M. Tehranipoor, Ujjwal Guin. TSensors Vision, Infrastructure and Security Challenges in Trillion Sensor Era
328 -- 339Asmit De, Mohammad Nasim Imtiaz Khan, Jongsun Park 0001, Swaroop Ghosh. Replacing eFlash with STTRAM in IoTs: Security Challenges and Solutions
340 -- 355Arvind Singh, Monodeep Kar, Sanu Mathew, Anand Rajan, Vivek De, Saibal Mukhopadhyay. Reducing Side-Channel Leakage of Encryption Engines Using Integrated Low-Dropout Voltage Regulators
356 -- 369Brien Croteau, Deepak Krishnankutty, Kiriakos Kiriakidis, Tracie Severson, Chintan Patel, Ryan Robucci, Erick J. Rodríguez-Seda, Nilanjan Banerjee. Cross-Level Detection Framework for Attacks on Cyber-Physical Systems

Volume 1, Issue 3

201 -- 202Debdeep Mukhopadhyay, Vishal Saraswat. Editorial for the Special Issue in Journal of Hardware and Systems Security (HaSS) Based on Selected Papers from 6th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2016)
203 -- 218Rajat Sadhukhan, Sikhar Patranabis, Ashrujit Ghoshal, Debdeep Mukhopadhyay, Vishal Saraswat, Santosh Ghosh. An Evaluation of Lightweight Block Ciphers for Resource-Constrained Applications: Area, Performance, and Security
219 -- 236Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout. A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs
237 -- 251Jakub Breier, Wei He, Shivam Bhasin, Dirmanto Jap, Samuel Chef, Hock Guan Ong, Chee Lip Gan. Extensive Laser Fault Injection Profiling of 65 nm FPGA
252 -- 268Debapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S. V. Dilip Kumar, Debdeep Mukhopadhyay, Mridul Nandi. Two Efficient Fault-Based Attacks on CLOC and SILC
269 -- 281Guido Bertoni, Marco Martinoli, Maria Chiara Molteni. A Methodology for the Characterisation of Leakages in Combinatorial Logic
282 -- 296Dhiman Saha, Sourya Kakarla, Srinath Mandava, Dipanwita Roy Chowdhury. Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ

Volume 1, Issue 2

103 -- 113Nandeesha Veeranna, Benjamin Carrión Schäfer. S3CBench: Synthesizable Security SystemC Benchmarks for High-Level Synthesis
114 -- 136Juan Lopez, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac. A Survey on Function and System Call Hooking Approaches
137 -- 155Md. Tauhidur Rahman, Alison Hosey, Zimu Guo, Jackson Carroll, Domenic Forte, Mark Tehranipoor. Systematic Correlation and Cell Neighborhood Analysis of SRAM PUF for Robust and Unique Key Generation
156 -- 172Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding. Differential Fault Analysis of SHA-3 Under Relaxed Fault Models
173 -- 187Rajesh Jayashankara Shridevi, Dean Michael Ancajas, Koushik Chakraborty, Sanghamitra Roy. Security Measures Against a Rogue Network-on-Chip
188 -- 199Anthony Bahadir Lopez, Korosh Vatanparvar, Atul Prasad Deb Nath, Shuo Yang, Swarup Bhunia, Mohammad Abdullah Al Faruque. A Security Perspective on Battery Systems of the Internet of Things

Volume 1, Issue 1

1 -- 2Swarup Bhunia, Mark Tehranipoor. Journal of Hardware and Systems Security (HaSS)
3 -- 17Sikhar Patranabis, Abhishek Chakraborty 0001, Debdeep Mukhopadhyay. Fault Tolerant Infective Countermeasure for AES
18 -- 37Yunxi Guo, Akhilesh Tyagi. Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication
38 -- 55Brent Sherman, Mike Borza, Brian Rosenberg, Charles Qi. Security Assurance Guidance for Third-Party IP
56 -- 67Nandeesha Veeranna, Benjamin Carrión Schäfer. Trust Filter: Runtime Hardware Trojan Detection in Behavioral MPSoCs
68 -- 84Yuanwen Huang, Prabhat Mishra. Trace Buffer Attack on the AES Cipher
85 -- 102Bicky Shakya, Miao Tony He, Hassan Salmani, Domenic Forte, Swarup Bhunia, Mark Tehranipoor. Benchmarking of Hardware Trojans and Maliciously Affected Circuits