Abstract is missing.
- AHD-LAM: A New Mitigation Method against Voltage-Drop Attacks in Multi-tenant FPGAsMashrafi Alam Kajol, Sandeep Sunkavilli, Qiaoyan Yu. 1-6 [doi]
- When Memory Mappings Attack: On the (Mis)use of the ARM Cortex-M FPB UnitHaoqi Shan, Dean Sullivan, Orlando Arias. 1-6 [doi]
- A Hybrid Neural Network for Simultaneous Multi-Attack Detection in Sensor NetworksNishanth Goud Chennagouni, Mohammad Mezanur Rahman Monjur, Wei Lu, Qiaoyan Yu. 1-6 [doi]
- A Lightweight Authentication Scheme with PE-Based Unclonable LabelRenchao Li, Zhen Weng, Aijiao Cui, Gang Qu 0001. 1-6 [doi]
- TrustSoC: Light and Efficient Heterogeneous SoC Architecture, Secure-by-designRaphaële Milan, Lilian Bossuet, Loïc Lagadec, Carlos Andres Lara-Nino, Brice Colombier. 1-6 [doi]
- A Comparative Analysis between Karatsuba, Toom-Cook and NTT Multiplier for Polynomial Multiplication in NTRU on FPGAHarish Prasad Allam, Suraj Mandal, Debapriya Basu Roy. 1-6 [doi]
- Tamper Resistant Design of Convolutional Neural Network Hardware AcceleratorHaosen Yu, Peiyao Sun, Basel Halak, Karthik Shanthakumar, Tomasz Kazmierski. 1-5 [doi]
- Overtake: Achieving Meltdown-type Attacks with One InstructionYu Jin, Pengfei Qiu, Chunlu Wang, Yihao Yang, Dongsheng Wang 0002, Xiaoyong Li 0003, Qian Wang, Gang Qu 0001. 1-6 [doi]
- A Lightweight and Machine-Learning-Resistant PUF framework based on Nonlinear Structure and Obfuscating ChallengesTianming Ni, Fei Li, Qingsong Peng, Senling Wang, Xiaoqing Wen. 1-6 [doi]
- HeisenTrojans: They Are Not There Until They Are TriggeredAkshita Reddy Mavurapu, Haoqi Shan, Xiaolong Guo, Orlando Arias, Dean Sullivan. 1-7 [doi]
- DF-TEE: Trusted Execution Environment for Disaggregated Multi-FPGA Cloud SystemsKe Xia, Sheng Wei 0001. 1-6 [doi]
- NNLeak: An AI-Oriented DNN Model Extraction Attack through Multi-Stage Side Channel AnalysisYa Gao, Haocheng Ma, Mingkai Yan, Jiaji He, Yiqiang Zhao, Yier Jin. 1-6 [doi]
- Processor based Intrinsic PUF Design for Approximate Computing: Faith or Reality?Aditya Japa, Jiliang Zhang 0002, Weiqiang Liu, Chongyan Gu. 1-6 [doi]
- Fault Analysis on AES and SM4 Through Automatic Property Extraction and CheckingXingxin Wang, Xinxin Wang, Chaoxuan Yuan, Wei Hu. 1-5 [doi]
- Emulating Covert Data Transmission on Heterogeneous SoCsLilian Bossuet, Carlos Andres Lara-Nino. 1-6 [doi]
- A Comparison of One-class and Two-class Models for Ransomware Detection via Low-level Hardware InformationChutitep Woralert, Chen Liu 0001, Zander Blasingame, Zhiliu Yang. 1-6 [doi]
- LLM4SecHW: Leveraging Domain-Specific Large Language Model for Hardware DebuggingWeimin Fu, Kaichen Yang, Raj Gautam Dutta, Xiaolong Guo, Gang Qu. 1-6 [doi]
- A Compact Weak PUF Circuit Based on Random Process Deviations of Amplifier ChainPengjun Wang, Yuanfeng Xie, Gang Li. 1-5 [doi]
- Hardware Security of Digital Image Filter IP Cores against Piracy using IP Seller's Fingerprint Encrypted Amino Acid Biometric SampleAnirban Sengupta, Rahul Chaurasia, Aditya Anshul. 1-6 [doi]
- DDQ-APUF: A Highly Reliable Arbiter PUF Using Delay Difference QuantizationXue Mei, Guangyang Zhang, Chongyan Gu, Yao Wang. 1-4 [doi]