Abstract is missing.
- Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT DevicesOmer Shwartz, Yael Mathov, Michael Bohadana, Yuval Elovici, Yossi Oren. 1-21 [doi]
- Optimal First-Order Boolean Masking for Embedded IoT DevicesAlex Biryukov, Daniel Dinu, Yann Le Corre, Aleksei Udovenko. 22-41 [doi]
- A First-Order Chosen-Plaintext DPA Attack on the Third Round of DESOscar Reparaz, Benedikt Gierlichs. 42-50 [doi]
- A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel AttacksYang Li, Shuang Wang, Zhibin Wang, Jian Wang. 51-69 [doi]
- A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel DistinguisherXinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang. 70-87 [doi]
- Leakage Bounds for Gaussian Side ChannelsThomas Unterluggauer, Thomas Korak, Stefan Mangard, Robert Schilling, Luca Benini, Frank K. Gürkaynak, Michael Muehlberghuber. 88-104 [doi]
- Towards Sound and Optimal Leakage Detection ProcedureA. Adam Ding, Liwei Zhang, François Durvaux, François-Xavier Standaert, Yunsi Fei. 105-122 [doi]
- Connecting and Improving Direct Sum Masking and Inner Product MaskingRomain Poussier, Qian Guo 0001, François-Xavier Standaert, Claude Carlet, Sylvain Guilley. 123-141 [doi]
- May the Force Be with You: Force-Based Relay Attack DetectionIakovos Gurulian, Gerhard P. Hancke 0002, Konstantinos Markantonakis, Raja Naeem Akram. 142-159 [doi]
- Instruction Duplication: Leaky and Not Too Fault-Tolerant!Lucian Cojocar, Kostas Papagiannopoulos, Niek Timmers. 160-179 [doi]
- An EM Fault Injection Susceptibility Criterion and Its Application to the Localization of HotspotsMaxime Madau, Michel Agoyan, Philippe Maurine. 180-195 [doi]
- Fault Analysis of the ChaCha and Salsa Families of Stream CiphersArthur Beckers, Benedikt Gierlichs, Ingrid Verbauwhede. 196-212 [doi]
- Applying Horizontal Clustering Side-Channel Attacks on Embedded ECC ImplementationsErick Nascimento, Lukasz Chmielewski. 213-231 [doi]
- Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA?Sihang Pu, Yu Yu, Weijia Wang, Zheng Guo, Junrong Liu, Dawu Gu, Lingyun Wang, Jie Gan. 232-247 [doi]