Abstract is missing.
- Towards Continuous Authentication in Internet of Things Based on Secret Sharing SchemeOmaimah Omar Bamasag, Kamal Youcef-Toumi. 1 [doi]
- A Novel Approach to Detect Hardware Trojan Attacks on Primary Data InputsTaimour Wehbe, Vincent Mooney, David C. Keezer, Nicholas B. Parham. 2 [doi]
- Analysis of Control Flow Events for Timing-based Runtime Anomaly DetectionSixing Lu, Roman Lysecky. 3 [doi]
- Bitslice software implementation of KeeLoq as a side-channel countermeasurePedro Malagón, Juan-Mariano de Goyeneche, David Fraga, José Manuel Moya. 4 [doi]
- Testing Feasibility of Back-Side Laser Fault Injection on a MicrocontrollerJakub Breier, Dirmanto Jap. 5 [doi]
- A Novel Attack on a FPGA based True Random Number GeneratorAnju P. Johnson, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay. 6 [doi]
- Performance analysis of broadcast authentication protocols on CAN-FD and FlexRayPaula Vasile, Bogdan Groza, Pal-Stefan Murvay. 7 [doi]
- Abstract Data Machine: Data Classifier for Reliable Embedded Systems SoftwareMuhammad Taimoor Khan, Anastasios Fragopoulos, Dimitrios N. Serpanos, Howard E. Shrobe. 8 [doi]
- CHEF: A Configurable Hardware Trojan Evaluation FrameworkChristian Krieg, Daniel Neubacher. 9 [doi]
- Security Challenges in ManyCore Embedded Systems based on Networks-on-Chip (NoCs)Ermis Papastefanakis, Bruno Maitre, Dominique Ragot. 10 [doi]