Journal: IEEE Trans. on CAD of Integrated Circuits and Systems

Volume 34, Issue 8

1209 -- 1222Debashis Banerjee, Shyam Kumar Devarakond, Xian Wang, Shreyas Sen, Abhijit Chatterjee. Real-Time Use-Aware Adaptive RF Transceiver Systems for Energy Efficiency Under BER Constraints
1223 -- 1235Zidong Du, Avinash Lingamneni, Yunji Chen, Krishna V. Palem, Olivier Temam, Chengyong Wu. Leveraging the Error Resilience of Neural Networks for Designing Highly Energy Efficient Accelerators
1236 -- 1249Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Christof Paar. FPGA Trojans Through Detecting and Weakening of Cryptographic Primitives
1250 -- 1263Yu-Min Lee, Chi-Wen Pan, Pei-Yu Huang, Chi-Ping Yang. LUTSim: A Look-Up Table-Based Thermal Simulator for 3-D ICs
1264 -- 1277Chen Wu, Chenchen Deng, Leibo Liu, Jie Han, Jiqiang Chen, Shouyi Yin, Shaojun Wei. An Efficient Application Mapping Approach for the Co-Optimization of Reliability, Energy, and Performance in Reconfigurable NoC Architectures
1278 -- 1290Wing Chiu Jason Tam, Ronald Shawn Blanton. LASIC: Layout Analysis for Systematic IC-Defect Identification Using Clustering
1291 -- 1294Sourabh Khandelwal, Harshit Agarwal, Juan Pablo Duarte, Kaiman Chan, Sagnik Dey, Yogesh Singh Chauhan, Chenming Hu. Modeling STI Edge Parasitic Current for Accurate Circuit Simulations
1295 -- 1307Georg T. Becker. On the Pitfalls of Using Arbiter-PUFs as Building Blocks
1308 -- 1319Andreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar. A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design, Implementation, and Evaluation
1320 -- 1333Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale. The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks
1334 -- 1343Durga Prasad Sahoo, Phuong Ha Nguyen, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty. A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks
1344 -- 1357Miltos D. Grammatikakis, Kyprianos Papadimitriou, Polydoros Petrakis, Antonis Papagrigoriou, George Kornaros, Ioannis Christoforakis, Othon Tomoutzoglou, George Tsamis, Marcello Coppola. Security in MPSoCs: A NoC Firewall and an Evaluation Framework
1358 -- 1369Linus Feiten, Matthias Sauer, Tobias Schubert, Victor Tomashevich, Ilia Polian, Bernd Becker. Formal Vulnerability Analysis of Security Components