Abstract is missing.
- DOST: Dynamically obfuscated wrapper for split test against IC piracyXiaoxiao Wang, Yueyu Guo, Tauhid Ramhan, Dongrong Zhang, Mark Tehranipoor. 1-6 [doi]
- PUFSec: Protecting physical unclonable functions using hardware isolation-based system security techniquesMengmei Ye, Mehrdad Zaker Shahrak, Sheng Wei 0001. 7-12 [doi]
- Implementation of stable PUFs using gate oxide breakdownWei-Che Wang, Yair Yona, Yizhang Wu, Szu-Yao Hung, Suhas N. Diggavi, Puneet Gupta. 13-18 [doi]
- A new key rank estimation method to investigate dependent key lists of side channel attacksShuang Wang, Yang Li, Jian Wang. 19-24 [doi]
- MPA: Model-assisted PCB attestation via board-level RO and temperature compensationZimu Guo, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte. 25-30 [doi]
- The impact of discharge inversion effect on learning SRAM power-up statisticsZhonghao Liao, George T. Amariucai, Raymond K. W. Wong, Yong Guan. 31-36 [doi]
- An energy-efficient true random number generator based on current starved ring oscillatorsYuan Cao, Chip-Hong Chang, Yue Zheng, Xiaojin Zhao. 37-42 [doi]
- Polymorphic PUF: Exploiting reconfigurability of CPU+FPGA SoC to resist modeling attackJing Ye, Yue Gong, Yu Hu, Xiaowei Li. 43-48 [doi]
- Improved low-entropy masking scheme for LED with mitigation against correlation-enhanced collision attacksFan Zhang 0010, Liang Geng, Jizhong Shen, Shivam Bhasin, Xinjie Zhao 0001, Shize Guo. 49-54 [doi]
- A practical cold boot attack on RSA private keysTian Wang, Xiaoxin Cui, Yewen Ni, Dunshan Yu, Xiaole Cui, Gang Qu. 55-60 [doi]
- A split manufacturing approach for unclonable chipless RFIDs for pharmaceutical supply chain securityKun Yang, Ulbert Botero, Hao-Ting Shen, Domenic Forte, Mark Tehranipoor. 61-66 [doi]
- Extending 1kb RRAM array from weak PUF to strong PUF by employment of SHA moduleRui Liu, Huaqiang Wu, Yachun Pang, He Qian, Shimeng Yu. 67-72 [doi]
- Mixed-granular architectural diversity for device security in the Internet of ThingsRobert Karam, Tamzidul Hoque, Kevin Butler, Swarup Bhunia. 73-78 [doi]
- PCH framework for IP runtime security verificationXiaolong Guo, Raj Gautam Dutta, Jiaji He, Yier Jin. 79-84 [doi]
- Scalable security path methodology: A cost-security trade-off to protect FPGA IPs against active and passive tampersSharareh Zamanzadeh, Ali Jahanian 0001. 85-90 [doi]
- On-chip jitter measurement for true random number generatorsBohan Yang 0001, Vladimir Rozic, Milos Grujic, Nele Mentens, Ingrid Verbauwhede. 91-96 [doi]
- Secure intra-vehicular communication over CANFDAli Shuja Siddiqui, Chia-Che Lee, Wenjie Che, Jim Plusquellic, Fareena Saqib. 97-102 [doi]
- Secure integration of non-trusted IPs in SoCsFestus Hategekimana, Taylor J. L. Whitaker, Md Jubaer Hossain Pantho, Christophe Bobda. 103-108 [doi]
- Employing dual-complementary flip-flops to detect EMFI attacksChinmay Deshpande, Bilgiday Yuce, Leyla Nazhandali, Patrick Schaumont. 109-114 [doi]
- Obfuscating branch decisions based on encrypted data using MISR and hash digestsNektarios Georgios Tsoutsos, Michail Maniatakos. 115-120 [doi]
- 'The danger of sleeping', an exploration of security in non-volatile processorsPatrick Cronin, Chengmo Yang, Dongqin Zhou, Keni Qiu, Xin Shi, Yongpan Liu. 121-126 [doi]
- Evaluating obfuscation performance of novel algorithm-to-architecture mapping techniques in systolic-array-based circuitsXiaojun Zhou, Jiafeng Xie. 127-132 [doi]