Abstract is missing.
- An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow AttacksLove Kumar Sah, Sheikh Ariful Islam, Srinivas Katkoori. 1-6 [doi]
- Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area NetworksShalabh Jain, Qian Wang, Md Tanvir Arafin, Jorge Guajardo. 7-12 [doi]
- Modeling and Efficiency Analysis of Clock Glitch Fault Injection AttackBo Ning 0001, Qiang Liu. 13-18 [doi]
- A Wavelet-based Power Analysis Attack against Random Delay CountermeasureXiaofei Dong, Fan Zhang, Samiya Quershi, Yiran Zhang, Ziyuan Liang, Bolin Yang, Feng Gao. 19-24 [doi]
- Defeating Strong PUF Modeling Attack via Adverse Selection of Challenge-Response PairsHoracio L. França, Charles B. Prado, Vinay C. Patil, Sandip Kundu. 25-30 [doi]
- Bias PUF based Secure Scan Chain DesignWenjie Li, Jing Ye, Xiaowei Li, Huawei Li, Yu Hu. 31-36 [doi]
- The Cell Dependency Analysis on Learning SRAM Power-Up StatesZhonghao Liao, Yong Guan. 37-43 [doi]
- Generation of PUF-Keys on FPGAs by K-means Frequency ClusteringK. A. Asha, Abhishek Patyal, Hung-Ming Chen. 44-49 [doi]
- Machine Learning Attacks on Voltage Over-scaling-based Lightweight AuthenticationHaihan Su, Jiliang Zhang. 50-55 [doi]
- SAIL: Machine Learning Guided Structural Analysis Attack on Hardware ObfuscationPrabuddha Chakraborty, Jonathan Cruz, Swarup Bhunia. 56-61 [doi]
- Preventing Neural Network Model Exfiltration in Machine Learning Hardware AcceleratorsMihailo Isakov, Lake Bu, Hai Cheng, Michel A. Kinsy. 62-67 [doi]
- Detecting RTL Trojans using Artificial Immune Systems and High Level Behavior ClassificationFarhath Zareen, Robert Karam. 68-73 [doi]
- Cost-efficient 3D Integration to Hinder Reverse Engineering During and After ManufacturingPeng Gu, Dylan Stow, Prashansa Mukim, Shuangchen Li, Yuan Xie. 74-79 [doi]
- Secrecy Performance of Cognitive Radio Sensor Networks with an Energy-Harvesting based Eavesdropper and Imperfect CSIRongjun Tan, Yuan Gao, Haixia He, Yuan Cao. 80-85 [doi]
- A Delay based Plug-in-Monitor for Intrusion Detection in Controller Area NetworkQian Wang, Yiming Qian, Zhaojun Lu, Yasser Shoukry, Gang Qu. 86-91 [doi]
- A novel lightweight hardware-assisted static instrumentation approach for ARM SoC using debug componentsMuhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Vianney Lapotre, Guy Gogniat, Arnab Kumar Biswas. 92-97 [doi]
- A Comprehensive Analysis on Vulnerability of Active Shields to Tilted Microprobing AttacksQihang Shi, Huanyu Wang, Navid Asadizanjani, Mark M. Tehranipoor, Domenic Forte. 98-103 [doi]
- Ring Oscillator Based Random Number Generator Using Wake-up and Shut-down UncertaintiesMehmet Alp Sarkisla, Salih Ergun. 104-108 [doi]
- Empirical Word-Level Analysis of Arithmetic Module Architectures for Hardware Trojan SusceptibilitySheikh Ariful Islam, Love Kumar Sah, Srinivas Katkoori. 109-114 [doi]