Abstract is missing.
- A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan DetectionLuong N. Nguyen, Baki Berkay Yilmaz, Milos Prvulovic, Alenka G. Zajic. 1-12 [doi]
- Template Attacks against ECC: practical implementation against Curve25519Antoine Loiseau, Maxime Lecomte, Jacques J. A. Fournier. 13-22 [doi]
- PARAM: A Microprocessor Hardened for Power Side-Channel Attack ResistanceMuhammad Arsath K. F, Vinod Ganesan, Rahul Bodduna, Chester Rebeiro. 23-34 [doi]
- BitJabber: The World's Fastest Electromagnetic Covert ChannelZihao Zhan, Zhenkai Zhang, Xenofon D. Koutsoukos. 35-45 [doi]
- Encoding Power Traces as Images for Efficient Side-Channel AnalysisBenjamin Hettwer, Tobias Horn, Stefan Gehrer, Tim Güneysu. 46-56 [doi]
- Thwarting Control Plane Attacks with Displaced and Dilated Address SpacesLauren Biernacki, Mark Gallagher 0003, Valeria Bertacco, Todd M. Austin. 57-68 [doi]
- Application-Specific Instruction Set Architecture for an Ultralight Hardware Security ModuleAhmed A. Ayoub, Mark D. Aagaard. 69-79 [doi]
- Going Deep: Using deep learning techniques with simplified mathematical models against XOR BR and TBR PUFs (Attacks and Countermeasures)Mahmoud Khalafalla, Mahmoud A. Elmohr, Catherine H. Gebotys. 80-90 [doi]
- 2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash MemoryWei Yan 0005, Huifeng Zhu, Zhiyuan Yu, Fatemeh Tehranipoor, John A. Chandy, Ning Zhang, Xuan Zhang 0001. 91-101 [doi]
- Secure Boot from Non-Volatile Memory for Programmable SoC ArchitecturesFranz-Josef Streit, Florian Fritz, Andreas Becher, Stefan Wildermann, Stefan Werner, Martin Schmidt-Korth, Michael Pschyklenk, Jürgen Teich. 102-110 [doi]
- Towards the Avoidance of Counterfeit Memory: Identifying the DRAM OriginBashir M. Sabquat Bahar Talukder, Vineetha Menon, Biswajit Ray, Tempestt J. Neal, Md. Tauhidur Rahman. 111-121 [doi]
- Hardware/Software Obfuscation against Timing Side-channel Attack on a GPUElmira Karimi, Yunsi Fei, David R. Kaeli. 122-131 [doi]
- Latch-Based Logic LockingJoseph Sweeney, V. Mohammed Zackriya, Samuel Pagliarini, Lawrence T. Pileggi. 132-141 [doi]
- CPU and GPU Accelerated Fully Homomorphic EncryptionToufique Morshed, Md Momin Al Aziz, Noman Mohammed. 142-153 [doi]
- ReGDS: A Reverse Engineering Framework from GDSII to Gate-level NetlistRachel Selina Rajarathnam, Yibo Lin, Yier Jin, David Z. Pan. 154-163 [doi]
- Evaluating Security Specification Mining for a CISC ArchitectureCalvin Deutschbein, Cynthia Sturton. 164-175 [doi]
- RS-Mask: Random Space Masking as an Integrated Countermeasure against Power and Fault AnalysisKeyvan Ramezanpour, Paul Ampadu, William Diehl. 176-187 [doi]
- Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-levelYuan Yao, Tarun Kathuria, Baris Ege, Patrick Schaumont. 188-196 [doi]
- MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel ProtectionAnuj Dubey, Rosario Cammarota, Aydin Aysu. 197-208 [doi]
- DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information LeakageHonggang Yu, Haocheng Ma, Kaichen Yang, Yiqiang Zhao, Yier Jin. 209-218 [doi]
- High Precision Laser Fault Injection using Low-cost ComponentsMartin S. Kelly, Keith Mayes. 219-228 [doi]
- Cryptographic Fault Diagnosis using VerFIVictor Arribas, Felix Wegener, Amir Moradi 0001, Svetla Nikova. 229-240 [doi]
- DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single FaultAikata, Banashri Karmakar, Dhiman Saha. 241-251 [doi]
- Statistical Ineffective Fault Analysis of GIMLIMichael Gruber, Matthias Probst, Michael Tempelmeier. 252-261 [doi]
- The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking SchemesM. Tanjidur Rahman, Shahin Tajik, M. Sazadur Rahman, Mark Mohammad Tehranipoor, Navid Asadizanjani. 262-272 [doi]
- Lattice PUF: A Strong Physical Unclonable Function Provably Secure against Machine Learning AttacksYe Wang 0014, Xiaodan Xi, Michael Orshansky. 273-283 [doi]
- Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic AlgorithmRabin Yu Acharya, Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte. 284-294 [doi]
- A Post-Quantum Secure Discrete Gaussian Noise SamplerRashmi S. Agrawal, Lake Bu, Michel A. Kinsy. 295-304 [doi]
- LAHEL: Lightweight Attestation Hardening Embedded Devices using MacrocellsOrlando Arias, Dean Sullivan, Haoqi Shan, Yier Jin. 305-315 [doi]
- Protecting RESTful IoT Devices from Battery Exhaustion DoS AttacksStefan Hristozov, Manuel Huber 0001, Georg Sigl. 316-327 [doi]