Abstract is missing.
- Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding ManufacturersOlivier Bronchain, Louis Dassy, Sebastian Faust, François-Xavier Standaert. 1-10 [doi]
- 200 Gbps Hardware Accelerated Encryption System for FPGA Network CardsZdenek Martinasek, Jan Hajny, David Smekal, Lukas Malina, Denis Matousek, Michal Kekely, Nele Mentens. 11-17 [doi]
- Demonstrating an LPPN ProcessorDina Kamel, Davide Bellizia, François-Xavier Standaert, Denis Flandre, David Bol. 18-23 [doi]
- Triggering Rowhammer Hardware Faults on ARM: A RevisitZhenkai Zhang, Zihao Zhan, Daniel Balasubramanian, Xenofon D. Koutsoukos, Gabor Karsai. 24-33 [doi]
- Acoustic Denial of Service Attacks on Hard Disk DrivesMohammad Shahrad, Arsalan Mosenia, Liwei Song, Mung Chiang, David Wentzlaff, Prateek Mittal. 34-39 [doi]
- Hardware Security at the Limit: Nuclear Verification and Arms ControlAlexander Glaser. 40 [doi]
- Behavioral Fingerprinting of IoT DevicesBruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray. 41-50 [doi]
- RSA Signatures Under Hardware RestrictionsMarc Joye, Yan Michalevsky. 51-54 [doi]
- A Low-cost Function Call Protection Mechanism Against Instruction Skip Fault AttacksYuan Yao, Patrick Schaumont. 55-64 [doi]
- CacheLight: Defeating the CacheKit AttackMauricio Gutierrez, Ziming Zhao 0001, Adam Doupé, Yan Shoshitaishvili, Gail-Joon Ahn. 65-74 [doi]
- Fixing the CLOC with Fine-grain Leakage AnalysisWilliam Diehl, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj. 75-80 [doi]
- Secure Positioning and Location-Based Security for IoT and BeyondSrdjan Capkun. 81 [doi]