144 | -- | 145 | Shiyan Hu, Yier Jin, Kenneth Heffner, Mark Tehranipoor. Guest Editorial: Hardware/Software Cross-Layer Technologies for Trustworthy and Secure Computing |
146 | -- | 159 | Meng-Day Mandel Yu, Matthias Hiller, Jeroen Delvaux, Richard Sowell, Srinivas Devadas, Ingrid Verbauwhede. A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication |
160 | -- | 173 | Xueyang Wang, Charalambos Konstantinou, Michail Maniatakos, Ramesh Karri, Serena Lee, Patricia Robison, Paul Stergiou, Steve Kim. Malicious Firmware Detection with Hardware Performance Counters |
174 | -- | 185 | Linus Feiten, Jonathan Oesterle, Tobias Martin, Matthias Sauer, Bernd Becker. Systemic Frequency Biases in Ring Oscillator PUFs on FPGAs |
186 | -- | 198 | Sanchita Mal-Sarkar, Robert Karam, Seetharam Narasimhan, Anandaroop Ghosh, Aswin Raghav Krishna, Swarup Bhunia. Design and Validation for FPGA Trust under Hardware Trojan Attacks |
199 | -- | 210 | Charles A. Kamhoua, Hong Zhao, Manuel Rodriguez, Kevin A. Kwiat. A Game-Theoretic Approach for Testing for Hardware Trojans |
211 | -- | 222 | Berk Gülmezoglu, Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar. Cross-VM Cache Attacks on AES |