Abstract is missing.
- Syndrome: Spectral analysis for anomaly detection on medical IoT and embedded devicesNader Sehatbakhsh, Monjur Alam, Alireza Nazari, Alenka G. Zajic, Milos Prvulovic. 1-8 [doi]
- Remote attestation of IoT devices via SMARM: Shuffled measurements against roving malwareXavier Carpent, Norrathep Rattanavipanon, Gene Tsudik. 9-16 [doi]
- TZSlicer: Security-aware dynamic program slicing for hardware isolationMengmei Ye, Jonathan Sherman, Witawas Srisa-an, Sheng Wei 0001. 17-24 [doi]
- Zero-permission acoustic cross-device trackingNikolay Matyunin, Jakub Szefer, Stefan Katzenbeisser 0001. 25-32 [doi]
- Dividing the threshold: Multi-probe localized EM analysis on threshold implementationsRobert Specht, Vincent Immler, Florian Unterstein, Johann Heyszl, Georg Sigl. 33-40 [doi]
- Direct read of idle block RAM from FPGAs utilizing photon emission microscopyJacob Couch, Nicole Whewell, Andrew Monica, Stergios Papadakis. 41-48 [doi]
- B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detectionVincent Immler, Johannes Obermaier, Martin Konig, Matthias Hiller, Georg Sigl. 49-56 [doi]
- Fault-assisted side-channel analysis of masked implementationsYuan Yao, Mo Yang, Conor Patrick, Bilgiday Yuce, Patrick Schaumont. 57-64 [doi]
- An efficient SAT-based algorithm for finding short cycles in cryptographic algorithmsElena Dubrova, Maxim Teslenko. 65-72 [doi]
- The CAESAR-API in the real world - Towards a fair evaluation of hardware CAESAR candidatesMichael Tempelmeier, Fabrizio De Santis, Georg Sigl, Jens-Peter Kaps. 73-80 [doi]
- Horizontal side-channel vulnerabilities of post-quantum key exchange protocolsAydin Aysu, Youssef Tobah, Mohit Tiwari, Andreas Gerstlauer, Michael Orshansky. 81-88 [doi]
- Independent detection of recycled flash memory: Challenges and solutionsPreeti Kumari, B. M. S. Bahar Talukder, Sadman Sakib, Biswajit Ray, Md Tauhidur Rahman. 89-95 [doi]
- A compact energy-efficient pseudo-static camouflaged logic familyPrashanth Mohan, Nail Etkin Can Akkaya, Burak Erbagci, Ken Mai. 96-102 [doi]
- CTCG: Charge-trap based camouflaged gates for reverse engineering preventionAsmit De, Anirudh Iyengar, Mohammad Nasim Imtiaz Khan, Sung-Hao Lin, Sandeep Krishna Thirumala, Swaroop Ghosh, Sumeet Kumar Gupta. 103-110 [doi]
- Secure chip odometers using intentional controlled agingNail Etkin Can Akkaya, Burak Erbagci, Ken Mai. 111-117 [doi]
- Fresh re-keying with strong PUFs: A new approach to side-channel securityXiaodan Xi, Aydin Aysu, Michael Orshansky. 118-125 [doi]
- Large scale RO PUF analysis over slice type, evaluation time and temperature on 28nm Xilinx FPGAsRobert Hesselbarth, Florian Wilde, Chongyan Gu, Neil Hanley. 126-133 [doi]
- Abnormal vehicle behavior induced using only fabricated informative CAN messagesJunko Takahashi, Masashi Tanaka, Hitoshi Fuji, Toshio Narita, Shunsuke Matsumoto, Hiroki Sato. 134-137 [doi]
- A flexible leakage trace collection setup for arbitrary cryptographic IP coresAthanassios Moschos, Apostolos P. Fournaris, Odysseas G. Koufopavlou. 138-142 [doi]
- Chaos computing for mitigating side channel attackMd. Badruddoja Majumder, Md Sakib Hasan, Mesbah Uddin, Garrett S. Rose. 143-146 [doi]
- Comparison of cost of protection against differential power analysis of selected authenticated ciphersWilliam Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj. 147-152 [doi]
- Delay model and machine learning exploration of a hardware-embedded delay PUFWenjie Che, Manel Martínez-Ramón, Fareena Saqib, Jim Plusquellic. 153-158 [doi]
- Energy efficient and side-channel secure hardware architecture for lightweight cipher SIMONArvind Singh, Nikhil Chawla, Monodeep Kar, Saibal Mukhopadhyay. 159-162 [doi]
- FPGA-oriented moving target defense against security threats from malicious FPGA toolsZhiming Zhang, Qiaoyan Yu, Laurent Njilla, Charles A. Kamhoua. 163-166 [doi]
- Hardware virtualization for protection against power analysis attackKai Yang, Jungmin Park, Mark Tehranipoor, Swarup Bhunia. 167-172 [doi]
- Inverse gating for low energy encryptionSubhadeep Banik, Andrey Bogdanov, Francesco Regazzoni, Takanori Isobe, Harunaga Hiwatari, Toru Akishita. 173-176 [doi]
- Lowering the barrier to online malware detection through low frequency sampling of HPCsPatrick Cronin, Chengmo Yang. 177-180 [doi]
- On state encoding against power analysis attacks for finite state controllersRicha Agrawal, Ranga Vemuri. 181-186 [doi]
- Prefetch-guard: Leveraging hardware prefetches to defend against cache timing channelsHongyu Fang, Sai Santosh Dayapule, Fan Yao, Milos Doroslovacki, Guru Venkataramani. 187-190 [doi]
- Protecting block ciphers against differential fault attacks without re-keyingAnubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin. 191-194 [doi]
- R2D2: Runtime reassurance and detection of A2 TrojanYumin Hou, Hu He, Kaveh Shamsi, Yier Jin, Dong Wu, Huaqiang Wu. 195-200 [doi]
- Repurposing SoC analog circuitry for additional COTS hardware securityAdam Duncan, Lei Jiang, Martin Swany. 201-204 [doi]
- RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learningBaibhab Chatterjee, Debayan Das, Shreyas Sen. 205-208 [doi]
- Robust, low-cost, and accurate detection of recycled ICs using digital signaturesMahabubul Alam, Sreeja Chowdhury, Mark M. Tehranipoor, Ujjwal Guin. 209-214 [doi]
- SAT-based reverse engineering of gate-level schematics using fault injection and probingShahrzad Keshavarz, Falk Schellenberg, Bastian Richter, Christof Paar, Daniel Holcomb. 215-220 [doi]
- Self-authenticating secure boot for FPGAsGoutham Pocklassery, Wenjie Che, Fareena Saqib, Matthew Areno, Jim Plusquellic. 221-226 [doi]
- 2: Stealth infection on neural network - A low-cost agile neural Trojan attack methodologyTao Liu, Wujie Wen, Yier Jin. 227-230 [doi]
- Securing interconnected PUF network with reconfigurabilityHongxiang Gu, Miodrag Potkonjak. 231-234 [doi]
- Value prediction for security (VPsec): Countering fault attacks in modern microprocessorsRami Sheikh, Ro Cammarota, Wenjia Ruan. 235-238 [doi]