Abstract is missing.
- Accelerating differential power analysis on heterogeneous systemsJoão Amaral, Francesco Regazzoni, Pedro Tomás, Ricardo Chaves. [doi]
- Risk management in embedded devices using metering applications as exampleOscar M. Guillen, Ralf Brederlow, Ralph Ledwa, Georg Sigl. [doi]
- Detection, traceback and filtering of denial of service attacks in networked embedded systemsAndreas Papalambrou, Kyriakos Stefanidis, John V. Gialelis, Dimitrios N. Serpanos. [doi]
- A signature based architecture for Trojan detectionAderinola Gbade-Alabi, David C. Keezer, Vincent Mooney, Axel York Poschmann, Marc Stöttinger, Kshitij Divekar. [doi]
- Some RSSB constructions with improved resistance towards differential power analysisBodhisatwa Mazumdar. [doi]
- Trusted sharing of intellectual property in electronic hardware designDebasri Saha, Susmita Sur-Kolay. [doi]
- Information theoretic models for signatures in VLSI power delivery systemsMarilyn Wolf, Saibal Mukhopadhyay. [doi]
- Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernetAnju P. Johnson, Sayandeep Saha, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay, Sezer Gören. [doi]
- Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horsesXuan Thuy Ngo, Sylvain Guilley, Shivam Bhasin, Jean-Luc Danger, Zakaria Najm. [doi]