Journal: J. Hardware and Systems Security

Volume 2, Issue 4

287 -- 288Domenic Forte, Yousef Iskander. Guest Editorial: Hardware Reverse Engineering and Obfuscation
289 -- 296Johannes Obermaier, Vincent Immler. The Past, Present, and Future of Physical Security Enclosures: From Battery-Backed Monitoring to PUF-Based Inherent Security and Beyond
297 -- 313Pascal Sasdrich, Tim Güneysu. Exploring RFC 7748 for Hardware Implementation: Curve25519 and Curve448 with Side-Channel Protection
314 -- 321Sergei Skorobogatov. Hardware Security Implications of Reliability, Remanence, and Recovery in Embedded Memory
322 -- 332Raul Quijada, Roger Dura, Jofre Pallares, Xavier Formatje, Salvador Hidalgo, Francisco Serra-Graells. Large-Area Automated Layout Extraction Methodology for Full-IC Reverse Engineering
333 -- 344Nidish Vashistha, M. Tanjidur Rahman, Hao-Ting Shen, Damon L. Woodard, Navid Asadizanjani, Mark Tehranipoor. Detecting Hardware Trojans Inserted by Untrusted Foundry Using Physical Inspection and Advanced Image Processing
345 -- 352Elham Amini, Anne Beyreuther, Norbert Herfurth, Alexander Steigert, Bernd Szyszka, Christian Boit. Assessment of a Chip Backside Protection

Volume 2, Issue 3

201 -- 213Travis Meade, Kaveh Shamsi, Thao Le, Jia Di, Shaojie Zhang, Yier Jin. The Old Frontier of Reverse Engineering: Netlist Partitioning
214 -- 224Shahrzad Keshavarz, Cunxi Yu, Samaneh Ghandali, Xiaolin Xu, Daniel Holcomb. Survey on Applications of Formal Methods in Reverse Engineering and Intellectual Property Protection
225 -- 239Vidya Govindan, Rajat Subhra Chakraborty, Pranesh Santikellur, Aditya Kumar Chaudhary. A Hardware Trojan Attack on FPGA-Based Cryptographic Key Generation: Impact and Detection
240 -- 250Preston D. Frazier, E. Thomas Gilmore, Isaac J. Collins, Wardell E. Samotshozo, Mohamed F. Chouikha. A Novel Counterfeit Detection Approach for Integrated Circuit Supply Chain Assurance
251 -- 265Taimour Wehbe, Vincent John Mooney, Omer T. Inan, David C. Keezer. Securing Medical Devices Against Hardware Trojan Attacks Through Analog-, Digital-, and Physiological-Based Signatures
266 -- 285Sparsh Mittal, S. B. Abhinaya, Manish Reddy, Irfan Ali. A Survey of Techniques for Improving Security of GPUs

Volume 2, Issue 2

97 -- 110Kejun Chen, Shuai Zhang, Zhikun Li, Yi Zhang, Qingxu Deng, Sandip Ray, Yier Jin. Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice
111 -- 130Bilgiday Yuce, Patrick Schaumont, Marc Witteman. Fault Attacks on Secure Embedded Software: Threats, Design, and Evaluation
131 -- 141Vivek Venugopalan, Cameron D. Patterson. Surveying the Hardware Trojan Threat Landscape for the Internet-of-Things
142 -- 161Sarah Amir, Bicky Shakya, Xiaolin Xu, Yier Jin, Swarup Bhunia, Mark Tehranipoor, Domenic Forte. Development and Evaluation of Hardware Obfuscation Benchmarks
162 -- 178Debapriya Basu Roy, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Wei He, Debdeep Mukhopadhyay, Zakaria Najm, Xuan Thuy Ngo. The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA
179 -- 200Sparsh Mittal, Ahmed Izzat Alsalibi. A Survey of Techniques for Improving Security of Non-volatile Memories

Volume 2, Issue 1

1 -- 14Muluken Hailesellasie, Syed Rafay Hasan. Intrusion Detection in PLC-Based Industrial Control Systems Using Formal Verification Approach in Conjunction with Graphs
15 -- 32Md Mahbub Alam, Sreeja Chowdhury, Beomsoo Park, David Munzer, Nima Maghari, Mark Tehranipoor, Domenic Forte. Challenges and Opportunities in Analog and Mixed Signal (AMS) Integrated Circuit (IC) Security
33 -- 50Yangdi Lyu, Prabhat Mishra. A Survey of Side-Channel Attacks on Caches and Countermeasures
51 -- 68Sujit Rokka Chhetri, Sina Faezi, Nafiul Rashid, Mohammad Abdullah Al Faruque. Manufacturing Supply Chain and Product Lifecycle Security in the Era of Industry 4.0
69 -- 82Chao Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding, Pei Luo, Saoni Mukherjee, David R. Kaeli. Power Analysis Attack of an AES GPU Implementation
83 -- 96Arash Nejat, David Hély, Vincent Beroulle. ESCALATION: Leveraging Logic Masking to Facilitate Path-Delay-Based Hardware Trojan Detection Methods