Abstract is missing.
- Hardware Security and its AdversariesMarten van Dijk. 1-2 [doi]
- Characterizing Composite User-Device Touchscreen Physical Unclonable Functions (PUFs) for Mobile Device AuthenticationRyan A. Scheel, Akhilesh Tyagi. 3-13 [doi]
- On the Systematic Drift of Physically Unclonable Functions Due to AgingAndré Schaller, Boris Skoric, Stefan Katzenbeisser 0001. 15-20 [doi]
- Faster Leakage Detection and ExploitationXin Ye, Mostafa Taha, Cong Chen, Thomas Eisenbarth. 21-29 [doi]
- Security-Aware Design Flow for 2.5D IC TechnologyYang Xie, Chongxi Bao, Ankur Srivastava. 31-38 [doi]
- A Plea for Incremental Work in IoT SecurityGeremy Condra. 39 [doi]
- Leveraging Processor Performance Counters for Security and PerformanceJakub Szefer. 41 [doi]
- Content Protection in HTML5 TV Platforms: Towards Browser-agnostic DRM and Cloud UI EnvironmentsAlexandra Mikityuk, Stefan Pham, Stefan Kaiser, Oliver Friedrich, Stefan Arbanowski. 43-52 [doi]
- An Overview of Automotive Cybersecurity: Challenges and Solution ApproachesAndré Weimerskirch. 53 [doi]
- XNPro: Low-Impact Hypervisor-Based Execution Prevention on ARMJan C. Nordholz, Julian Vetter, Michael Peter, Matthias Junker-Petschick, Janis Danisevskis. 55-64 [doi]