Abstract is missing.
- Secure Hardware and Cryptography: Contrasts, Synergies and ChallengesSrinivas Devadas. 1 [doi]
- Data-driven Software Security and its Hardware SupportÚlfar Erlingsson. 3 [doi]
- Hardware-Assisted Security: Promises, Pitfalls and OpportunitiesAhmad-Reza Sadeghi. 5 [doi]
- Boolean Circuit Camouflage: Cryptographic Models, Limitations, Provable Results and a Random Oracle RealizationGiovanni Di Crescenzo, Jeyavijayan Rajendran, Ramesh Karri, Nasir D. Memon. 7-16 [doi]
- Optimizing Cryptography in Energy Harvesting ApplicationsCharles Suslowicz, Archanaa S. Krishnan, Patrick Schaumont. 17-26 [doi]
- WaC: SpaceTEE - Secure and Tamper-Proof Computing in Space using CubeSatsYan Michalevsky, Yonatan Winetraub. 27-32 [doi]
- SoK: RFID-based Clone Detection Mechanisms for Supply ChainsHoda Maleki, Reza Rahaeimehr, Marten van Dijk. 33-41 [doi]
- EM Side-Channel Analysis of BCH-based Error Correction for PUF-based Key GenerationLars Tebelmann, Michael Pehl, Georg Sigl. 43-52 [doi]
- On Feasibility and Performance of Rowhammmer AttackVarnavas Papaioannou, Nicolas Courtois. 53-58 [doi]