Abstract is missing.
- Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved securityAndré Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser 0001, Jakub Szefer. 1-7 [doi]
- When good protections go bad: Exploiting anti-DoS measures to accelerate rowhammer attacksMisiker Tadesse Aga, Zelalem Birhanu Aweke, Todd M. Austin. 8-13 [doi]
- Hermes: Secure heterogeneous multicore architecture designMichel A. Kinsy, Shreeya Khadka, Mihailo Isakov, Anam Farrukh. 14-20 [doi]
- Reviving instruction set randomizationKanad Sinha, Vasileios P. Kemerlis, Simha Sethumadhavan. 21-28 [doi]
- Creating security primitive by nanoscale manipulation of carbon nanotubesZhaoying Hu, Shu-Jen Han. 29-34 [doi]
- Automatic generation of high-performance modular multipliers for arbitrary mersenne primes on FPGAsPhilipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl. 35-40 [doi]
- Efficient configurations for block ciphers with unified ENC/DEC pathsSubhadeep Banik, Andrey Bogdanov, Francesco Regazzoni. 41-46 [doi]
- Memory-constrained implementation of lattice-based encryption scheme on standard Java CardYe Yuan, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi. 47-50 [doi]
- Towards a memristive hardware secure hash function (MemHash)Leonid Azriel, Shahar Kvatinsky. 51-55 [doi]
- Stateless leakage resiliency from NLFSRsMostafa M. I. Taha, Arash Reyhani-Masoleh, Patrick Schaumont. 56-61 [doi]
- High efficiency power side-channel attack immunity using noise injection in attenuated signature domainDebayan Das, Shovan Maity, Saad Bin Nasir, Santosh Ghosh, Arijit Raychowdhury, Shreyas Sen. 62-67 [doi]
- Exploring timing side-channel attacks on path-ORAMsChongxi Bao, Ankur Srivastava. 68-73 [doi]
- Photonic side channel attacks against RSAElad Carmon, Jean-Pierre Seifert, Avishai Wool. 74-78 [doi]
- Characterising a CPU fault attack model via run-time data analysisMartin S. Kelly, Keith Mayes, John F. Walker. 79-84 [doi]
- Breaking active-set backward-edge CFIMichael Theodorides, David A. Wagner 0001. 85-89 [doi]
- INFECT: INconspicuous FEC-based Trojan: A hardware attack on an 802.11a/g wireless networkKiruba Sankaran Subramani, Angelos Antonopoulos, Ahmed Attia Abotabl, Aria Nosratinia, Yiorgos Makris. 90-94 [doi]
- AppSAT: Approximately deobfuscating integrated circuitsKaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, Yier Jin. 95-100 [doi]
- Challenging on-chip SRAM security with boot-state statisticsJoseph McMahan, Weilong Cui, Liang Xia, Jeff Heckey, Frederic T. Chong, Timothy Sherwood. 101-105 [doi]
- A novel physiological features-assisted architecture for rapidly distinguishing health problems from hardware Trojan attacks and errors in medical devicesTaimour Wehbe, Vincent John Mooney, Abdul Qadir Javaid, Omer T. Inan. 106-109 [doi]
- Using computational game theory to guide verification and security in hardware designsAndrew M. Smith, Jackson R. Mayo, Vivian Kammler, Robert C. Armstrong, Yevgeniy Vorobeychik. 110-115 [doi]
- Physical unclonable functions and dynamic partial reconfiguration for security in resource-constrained embedded systemsG. Pocklassery, Venkata K. Kajuruli, James F. Plusquellic, Fareena Saqib. 116-121 [doi]
- New clone-detection approach for RFID-based supply chainsHoda Maleki, Reza Rahaeimehr, Chenglu Jin, Marten van Dijk. 122-127 [doi]
- Take a moment and have some t: Hypothesis testing on raw PUF dataVincent Immler, Matthias Hiller, Johannes Obermaier, Georg Sigl. 128-129 [doi]
- A new maskless debiasing method for lightweight physical unclonable functionsAydin Aysu, Ye Wang, Patrick Schaumont, Michael Orshansky. 134-139 [doi]
- A stochastic all-digital weak physically unclonable function for analog/mixed-signal applicationsTroy Bryant, Sreeja Chowdhury, Domenic Forte, Mark Tehranipoor, Nima Maghari. 140-145 [doi]
- Improving reliability of weak PUFs via circuit techniques to enhance mismatchVinay C. Patil, Arunkumar Vijayakumar, Daniel E. Holcomb, Sandip Kundu. 146-150 [doi]
- Ag conductive bridge RAMs for physical unclonable functionsBertrand Cambou, Fatemeh Afghah, Derek Sonderegger, Jennifer Taggart, Hugh J. Barnaby, Michael N. Kozicki. 151 [doi]
- Fabrication security and trust of domain-specific ASIC processorsMichael Vai, Karen Gettings, Theodore Lyszczarz. 152 [doi]
- Øzone: Efficient execution with zero timing leakage for modern microarchitecturesZelalem Birhanu Aweke, Todd M. Austin. 153 [doi]
- LWE-based lossless computational fuzzy extractor for the Internet of ThingsChristopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu. 154 [doi]
- Cache timing attacks on recent microarchitecturesAlexandres Andreou, Andrey Bogdanov, Elmar Tischhauser. 155 [doi]
- Analyzing security vulnerabilities of three-dimensional integrated circuitsJaya Dofe, Qiaoyan Yu. 156 [doi]
- A novel offset method for improving bitstring quality of a Hardware-Embedded delay PUFWenjie Che, Jim Plusquellic, Fareena Saqib. 157 [doi]
- Malicious CAN-message attack against advanced driving assistant systemMitsuru Shiozaki, Takaya Kubota, Masashi Nakano, Yuuki Nakazawa, Takeshi Fujino. 158 [doi]
- Improving FPGA based SHA-3 structuresMagnus Sundal, Ricardo Chaves. 159 [doi]
- On secure implementations of quantum-resistant supersingular isogeny Diffie-HellmanBrian Koziel, Reza Azarderakhsh, David Jao. 160 [doi]
- Parameter biasing obfuscation for analog IP protectionVaibhav Venugopal Rao, Ioannis Savidis. 161 [doi]
- Circuit recognition with deep learningYu-Yun Dai, Robert K. Brayton. 162 [doi]
- Detection of counterfeit ICs using public identification sequencesPeter Samarin, Kerstin Lemke-Rust. 163 [doi]
- Threshold voltage defined multi-input complex gatesAsmit De, Swaroop Ghosh. 164 [doi]
- Platform agnostic, scalable, and unobtrusive FPGA network processor design of moving target defense over IPv6 (MT6D) over IEEE 802.3 EthernetJoseph Sagisi, Joseph Tront, Randy Marchany Bradley. 165 [doi]
- TTLock: Tenacious and traceless logic lockingMuhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan J. V. Rajendran, Ozgur Sinanoglu. 166 [doi]
- Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horseKrishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty. 167 [doi]
- Abstract: Characterizing EEPROM for usage as a ubiquitous PUF sourceChris Pavlina, Jacob Torrey, Kyle Temkin. 168 [doi]
- On designing optimal camouflaged layoutsThomas Broadfoot, Carl Sechen, Jeyavijayan J. V. Rajendran. 169 [doi]
- Connecting the dots: Privacy leakage via write-access patterns to the main memoryTara Merin John, Syed Kamran Haider, Hamza Omar, Marten van Dijk. 170 [doi]
- Correlation power analysis attack against STT-MRAM based cyptosystemsAbhishek Chakraborty, Ankit Mondal, Ankur Srivastava. 171 [doi]
- Synthesis of hardware sandboxes for Trojan mitigation in systems on chipChristophe Bobda, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla. 172 [doi]