Abstract is missing.
- In Search of Trust: 30 Years of Evolution of Trusted Computing and Hardware SecurityClaire Vishik. 1 [doi]
- Physical Unclonable Functions: The First Fifty YearsRavikanth Pappu. 3 [doi]
- FOBOS 3: An Open-Source Platform for Side-Channel Analysis and BenchmarkingEduardo Ferrufino, Luke Beckwith, Abubakr Abdulgadir, Jens-Peter Kaps. 5-14 [doi]
- Better Side-Channel Attacks Through MeasurementsAlok K. Singh, Ryan M. Gerdes. 15-26 [doi]
- A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-KyberYanning Ji, Elena Dubrova. 27-37 [doi]
- Cover Chirp Jaming: Hybrid Jamming-Deception Attack on FMCW Radar and Its CountermeasureShoei Nashimoto, Tomoyuki Nagatsuka. 39-50 [doi]
- Enabling Lattice-Based Post-Quantum Cryptography on the OpenTitan PlatformTobias Stelzer, Felix Oberhansl, Jonas Schupp, Patrick Karl. 51-60 [doi]
- BioLeak: Exploiting Cache Timing to Recover Fingerprint Minutiae CoordinatesOwen Pemberton, David F. Oswald. 61-72 [doi]
- Beyond the Last Layer: Deep Feature Loss Functions in Side-channel AnalysisTrevor Yap, Stjepan Picek, Shivam Bhasin. 73-82 [doi]
- Netlist Whisperer: AI and NLP Fight Circuit Leakage!Madhav Nair, Rajat Sadhukhan, Hammond Pearce, Debdeep Mukhopadhyay, Ramesh Karri. 83-92 [doi]
- Remote Fault Injection Attack against Cryptographic Modules via Intentional Electromagnetic Interference from an AntennaHikaru Nishiyama, Daisuke Fujimoto, Yu-ichi Hayashi. 93-102 [doi]
- Effective Layout Design for Laser Fault Sensor on FPGAShungo Hayashi, Junichi Sakamoto, Masaki Chikano, Tsutomu Matsumoto. 103-112 [doi]
- Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted AnalysisXhani Marvin Saß, Thilo Krachenfels, Frederik Dermot Pustelnik, Jean-Pierre Seifert, Frank Altmann. 113-122 [doi]
- Towards Unsupervised SEM Image Segmentation for IC Layout ExtractionNils Rothaug, Simon Klix, Nicole Auth, Sinan Böcker, Endres Puschner, Steffen Becker 0003, Christof Paar. 123-128 [doi]