Abstract is missing.
- An End-to-End Secure Solution for IoMT Data ExchangeSaad El Jaouhari, Nouredine Tamani. 3-15 [doi]
- EasyLog: An Efficient Kernel Logging Service for Machine LearningXundi Yang, Kefan Qiu, Quanxin Zhang. 16-28 [doi]
- LM-cAPI:A Lite Model Based on API Core Semantic Information for Malware ClassificationYifan Zhou, Zhenyan Liu, Jingfeng Xue, Yong Wang, Ji Zhang. 29-42 [doi]
- Acki Nacki: A Probabilistic Proof-of-Stake Consensus Protocol with Fast Finality and ParallelisationMitja Goroshevsky, Nikita Sattarov, Alina Trepacheva. 43-62 [doi]
- FPGA Implementation of Physically Unclonable Functions Based on Multi-threshold Delay Time Measurement Method to Mitigate Modeling AttacksTatsuya Oyama, Mika Sakai, Yohei Hori, Toshihiro Katashita, Takeshi Fujino. 65-83 [doi]
- Incorporating Cluster Analysis of Feature Vectors for Non-profiled Deep-learning-Based Side-Channel AttacksYuta Fukuda, Kota Yoshida, Takeshi Fujino. 84-101 [doi]
- Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel AttackTrevor Yap, Dirmanto Jap. 102-120 [doi]
- Diversity Algorithms for Laser Fault InjectionMarina Krcek, Thomas Ordas. 121-138 [doi]
- One for All, All for Ascon: Ensemble-Based Deep Learning Side-Channel AnalysisAzade Rezaeezade, Abraham Basurto-Becerra, Léo Weissbart, Guilherme Perin. 139-157 [doi]
- CNN Architecture Extraction on Edge GPUPéter Horváth, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom. 158-175 [doi]
- Harnessing the Power of General-Purpose LLMs in Hardware Trojan DesignGeorgios Kokolakis, Athanasios Moschos, Angelos D. Keromytis. 176-194 [doi]
- Everything All at Once: Deep Learning Side-Channel Analysis Optimization FrameworkGabriele Serafini, Léo Weissbart, Lejla Batina. 195-212 [doi]
- Device Fingerprinting in a Smart Grid CPSChuadhry Mujeeb Ahmed, Nandha Kumar Kandasamy, Darren Ng Wei Hong, Jianying Zhou 0001. 215-234 [doi]
- Power Quality Forecasting of Microgrids Using Adaptive Privacy-Preserving Machine LearningMazhar Ali, Ajit Kumar 0001, Bong Jun Choi 0001. 235-245 [doi]
- Evaluation of Lightweight Machine Learning-Based NIDS Techniques for Industrial IoTAlex Baron, Laurens Le Jeune, Wouter Hellemans, Md Masoom Rabbani, Nele Mentens. 246-264 [doi]
- Measuring Cyber Resilience of IoT-Enabled Critical National InfrastructuresAdeola Adewumi, Mohammad Hammoudeh, Tooska Dargahi, Olamide Jogunola. 265-280 [doi]
- Towards Discovering Quantum-Threats for Applications Using Open-Source LibrariesXiaodong Ye, Teik Guan Tan, Jianying Zhou 0001. 283-302 [doi]
- Pushing AES-256-GCM to Limits: Design, Implementation and Real FPGA TestsPeter Cíbik, Patrik Dobias, Sara Ricci, Jan Hajny, Lukas Malina, Petr Jedlicka, David Smekal. 303-318 [doi]
- Automated Generation of Masked Nonlinear Components: - From Lookup Tables to Private CircuitsLixuan Wu, Yanhong Fan 0001, Bart Preneel, Weijia Wang 0003, Meiqin Wang. 319-339 [doi]
- A Command-Activated Hardware Trojan Detection Method Based on LUNAR FrameworkXue Yang, Congming Wei, Yaoling Ding, Shaofei Sun, An Wang 0001, Jiazhe Chen. 340-358 [doi]
- Cross-Correlation Based Trace Segmentation for Clustering Power Analysis on Public Key CryptosystemsYaoyuan Hu, an Wang, Weiping Gong, Jingjie Wu, Ziyu Wang, Shiming Zhang, Shufan Ma. 359-375 [doi]
- Fully Hybrid TLSv1.3 in WolfSSL on Cortex-M4Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani. 376-395 [doi]