Abstract is missing.
- A Formal Framework for Gate- Level Information Leakage Using Z3Qizhi Zhang, Jiaji He, Yiqiang Zhao, Xiaolong Guo. 1-6 [doi]
- WaLo: Security Primitive Generator for RT-Level Logic Locking and WatermarkingJun Kuai, Jiaji He, Haocheng Ma, Yiqiang Zhao, Yumin Hou, Yier Jin. 1-6 [doi]
- Revisiting Persistent Fault Analysis: Assessing Weak Keys and Strong Keys in GIFT-64 Lightweight CipherArjit Arora, Kalpit Kothari, Priyanka Joshi, Bodhisatwa Mazumdar. 1-6 [doi]
- Boosting Entropy and Enhancing Reliability for Physically Unclonable FunctionsRicardo Valles-Novo, Andres Martinez-Sanchez, Wenjie Che. 1-6 [doi]
- SAT Based Partial Attack on Compound Logic LockingMelbin John, Aadil Hoda, Ramanuj Chouksey, Chandan Karfa. 1-6 [doi]
- Characterization of Electromagnetic Fault Injection on a 32-bit Microcontroller Instruction BufferOualid Trabelsi, Laurent Sauvage, Jean-Luc Danger. 1-6 [doi]
- Architecting a Secure Wireless Interconnect for Multichip Communication: An ML ApproachM. Meraj Ahmed, Abhishek Vashist, Sai Manoj Pudukotai Dinakarrao, Amlan Ganguly. 1-6 [doi]
- MIDAS: Model Inversion Defenses Using an Approximate Memory SystemQian Xu, Md Tanvir Arafin, Gang Qu. 1-4 [doi]
- PUF Based Secure Framework for Hardware and Software Security of DronesVishal Pal, Srikrishna Acharya, Somesh Shrivastav, Sourav Saha, Ashish Joglekar, Bharadwaj Amrutur. 1-6 [doi]
- Malware Classification Through Attention Residual Network based VisualizationDiangarti Bhalang Tariang, Sri Charan Birudaraju, Ruchira Naskar, Vijeta Khare, Rajat Subhra Chakraborty. 1-6 [doi]
- FPGA Accelerated Embedded System Security Through Hardware IsolationSujan Kumar Saha, Christophe Bobda. 1-6 [doi]
- On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault AnalysisJeroen Delvaux. 1-6 [doi]
- Defending Against Adversarial Attacks in Deep Learning with Robust Auxiliary Classifiers Utilizing Bit Plane SlicingYuan Liu, Pingqiang Zhou. 1-4 [doi]
- PowerScout: A Security-Oriented Power Delivery Network Modeling Framework for Cross-Domain Side-Channel AnalysisHuifeng Zhu, Xiaolong Guo, Yier Jin, Xuan Zhang 0001. 1-6 [doi]
- HybridTEE: Secure Mobile DNN Execution Using Hybrid Trusted Execution EnvironmentAkshay Gangal, Mengmei Ye, Sheng Wei 0001. 1-6 [doi]
- Protecting Platoons from Stealthy Jamming AttackYaodan Hu, Haoqi Shan, Raj Gautam Dutta, Yier Jin. 1-6 [doi]
- Compact and Secure Generic Discrete Gaussian Sampler based on HW/SW Co-designSudarshan Sharma, Arnab Bag, Debdeep Mukhopadhyay. 1-6 [doi]
- Defense Against on-Chip Trojans Enabling Traffic Analysis AttacksM. Meraj Ahmed, Abhijitt Dhavlle, Naseef Mansoor, Purab Ranjan Sutradhar, Sai Manoj Pudukotai Dinakarrao, Kanad Basu, Amlan Ganguly. 1-6 [doi]
- Feedback-based Channel Gain Complement and Cluster-based Quantization for Physical Layer Key GenerationHang Liu, Chaofan Zhang, Hongming Fei, Wei Hu, Dawei Guo. 1-6 [doi]
- Hardware-Based Detection of Spectre Attacks: A Machine Learning ApproachYunjie Zhang, Yiorgos Makris. 1-6 [doi]
- Revisiting the security of static masking and compaction: Discovering new vulnerability and Improved Scan Attack on AESYogendra Sao, K. K. Soundra Pandian, Sk Subidh Ali. 1-6 [doi]