1209 | -- | 1222 | Debashis Banerjee, Shyam Kumar Devarakond, Xian Wang, Shreyas Sen, Abhijit Chatterjee. Real-Time Use-Aware Adaptive RF Transceiver Systems for Energy Efficiency Under BER Constraints |
1223 | -- | 1235 | Zidong Du, Avinash Lingamneni, Yunji Chen, Krishna V. Palem, Olivier Temam, Chengyong Wu. Leveraging the Error Resilience of Neural Networks for Designing Highly Energy Efficient Accelerators |
1236 | -- | 1249 | Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Christof Paar. FPGA Trojans Through Detecting and Weakening of Cryptographic Primitives |
1250 | -- | 1263 | Yu-Min Lee, Chi-Wen Pan, Pei-Yu Huang, Chi-Ping Yang. LUTSim: A Look-Up Table-Based Thermal Simulator for 3-D ICs |
1264 | -- | 1277 | Chen Wu, Chenchen Deng, Leibo Liu, Jie Han, Jiqiang Chen, Shouyi Yin, Shaojun Wei. An Efficient Application Mapping Approach for the Co-Optimization of Reliability, Energy, and Performance in Reconfigurable NoC Architectures |
1278 | -- | 1290 | Wing Chiu Jason Tam, Ronald Shawn Blanton. LASIC: Layout Analysis for Systematic IC-Defect Identification Using Clustering |
1291 | -- | 1294 | Sourabh Khandelwal, Harshit Agarwal, Juan Pablo Duarte, Kaiman Chan, Sagnik Dey, Yogesh Singh Chauhan, Chenming Hu. Modeling STI Edge Parasitic Current for Accurate Circuit Simulations |
1295 | -- | 1307 | Georg T. Becker. On the Pitfalls of Using Arbiter-PUFs as Building Blocks |
1308 | -- | 1319 | Andreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar. A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design, Implementation, and Evaluation |
1320 | -- | 1333 | Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale. The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks |
1334 | -- | 1343 | Durga Prasad Sahoo, Phuong Ha Nguyen, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty. A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks |
1344 | -- | 1357 | Miltos D. Grammatikakis, Kyprianos Papadimitriou, Polydoros Petrakis, Antonis Papagrigoriou, George Kornaros, Ioannis Christoforakis, Othon Tomoutzoglou, George Tsamis, Marcello Coppola. Security in MPSoCs: A NoC Firewall and an Evaluation Framework |
1358 | -- | 1369 | Linus Feiten, Matthias Sauer, Tobias Schubert, Victor Tomashevich, Ilia Polian, Bernd Becker. Formal Vulnerability Analysis of Security Components |