Abstract is missing.
- Security challenges and opportunities in adaptive and reconfigurable hardwareVictor Costan, Srinivas Devadas. 1-5 [doi]
- TinyTPM: A lightweight module aimed to IP protection and trusted embedded platformsThomas Feller, Sunil Malipatlolla, David Meister, Sorin A. Huss. 6-11 [doi]
- Enhancing security via provably trustworthy hardware intellectual propertyEric Love, Yier Jin, Yiorgos Makris. 12-17 [doi]
- ODETTE: A non-scan design-for-test methodology for Trojan detection in ICsMainak Banga, Michael S. Hsiao. 18-23 [doi]
- Influence of the temperature on true random number generatorsMathilde Soucarros, Cécile Canovas-Dumas, Jessy Clédière, Philippe Elbaz-Vincent, Denis Réal. 24-27 [doi]
- Implementation and verification of DPA-resistant cryptographic DES circuit using Domino-RSLKatsuhiko Iwai, Mitsuru Shiozaki, Anh Tuan Hoang, Kenji Kojima, Takeshi Fujino. 28-33 [doi]
- Security Checkers: Detecting processor malicious inclusions at runtimeMichael Bilzor, Ted Huffmire, Cynthia E. Irvine, Timothy E. Levin. 34-39 [doi]
- Formal security evaluation of hardware Boolean masking against second-order attacksHoussem Maghrebi, Sylvain Guilley, Jean-Luc Danger. 40-46 [doi]
- TrustGeM: Dynamic trusted environment generation for chip-multiprocessorsLuis Angel D. Bathen, Nikil D. Dutt. 47-50 [doi]
- Performance evaluation of protocols resilient to physical attacksSylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Denis Réal. 51-56 [doi]
- Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodologySumio Morioka, Toshiyuki Isshiki, Satoshi Obana, Yuichi Nakamura, Kazue Sako. 57-62 [doi]
- Systematic security evaluation method against C safe-error attacksDusko Karaklajic, Junfeng Fan, Ingrid Verbauwhede. 63-66 [doi]
- Case study: Detecting hardware Trojans in third-party digital IP coresXuehui Zhang, Mohammad Tehranipoor. 67-70 [doi]
- TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detectionSeetharam Narasimhan, Xinmu Wang, Dongdong Du, Rajat Subhra Chakraborty, Swarup Bhunia. 71-74 [doi]
- Algorithmic collision analysis for evaluating cryptographic systems and side-channel attacksQiasi Luo, Yunsi Fei. 75-80 [doi]
- Accelerating early design phase differential power analysis using power emulation techniquesArmin Krieg, Christian Bachmann, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Josef Haid. 81-86 [doi]
- A fast power current analysis methodology using capacitor charging model for side channel attack evaluationDaisuke Fujimoto, Makoto Nagata, Toshihiro Katashita, Akihiro T. Sasaki, Yohei Hori, Akashi Satoh. 87-92 [doi]
- Hardware security in practice: Challenges and opportunitiesNachiketh R. Potlapally. 93-98 [doi]
- Low-cost recovery for the code integrity protection in secure embedded processorsNguyen Minh Huu, Bruno Robisson, Michel Agoyan, Nathalie Drach. 99-104 [doi]
- New security threats against chips containing scan chain structuresJean DaRolt, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre. 110 [doi]
- Placement of trust anchors in embedded computer systemsStephen M. Papa, William D. Casper, Suku Nair. 111-116 [doi]
- MARVEL - Malicious alteration recognition and verification by emission of lightPeilin Song, Franco Stellari, Dirk Pfeiffer, Jim Culp, Alan J. Weger, Alyssa Bonnoit, Bob Wisnieff, Marc Taubenblatt. 117-121 [doi]
- A survey of frequently identified vulnerabilities in commercial computing semiconductorsKevin Gotze. 122-126 [doi]
- Hardware intrinsic security based on SRAM PUFs: Tales from the industryHelena Handschuh. 127 [doi]
- Reliable and efficient PUF-based key generation using pattern matchingZdenek Sid Paral, Srinivas Devadas. 128-133 [doi]
- The Bistable Ring PUF: A new architecture for strong Physical Unclonable FunctionsQingqing Chen, György Csaba, Paolo Lugli, Ulf Schlichtmann, Ulrich Rührmair. 134-141 [doi]
- On improving reliability of delay based Physically Unclonable Functions under temperature variationsRaghavan Kumar, Harikrishnan Kumarapillai Chandrikakutty, Sandip Kundu. 142-147 [doi]
- Revisit fault sensitivity analysis on WDDL-AESYang Li, Kazuo Ohta, Kazuo Sakiyama. 148-153 [doi]
- Practical evaluation of DPA countermeasures on reconfigurable hardwareAmir Moradi, Oliver Mischke, Christof Paar. 154-160 [doi]
- A novel fault attack against ECDSAAlessandro Barenghi, Guido Bertoni, Andrea Palomba, Ruggero Susella. 161-166 [doi]