Abstract is missing.
- EnclaveSim: A Micro-architectural Simulator with Enclave SupportYashika Verma, Dixit Kumar, Biswabandan Panda. 1-4 [doi]
- Towards Attack Resilient Delay-Based Strong PUFsNils Wisiol. 5-8 [doi]
- Security Properties Driven Pre-Silicon Laser Fault Injection AssessmentNitin Pundir, Henian Li, Lang Lin, Norman Chang, Farimah Farahmandi, Mark M. Tehranipoor. 9-12 [doi]
- Warm Up before Circuit De-obfuscation? An Exploration through Bounded-Model-CheckersKimia Zamiri Azar, Hadi Mardani Kamali, Farimah Farahmandi, Mark M. Tehranipoor. 13-16 [doi]
- Layout-level Vulnerability Ranking from Electromagnetic Fault InjectionLang Lin, Jimin Wen, Harsh Shrivastav, Weike Li, Hua Chen, Gang Ni, Sreeja Chowdhury, Calvin Chow, Norman Chang. 17-20 [doi]
- Structural Analysis Attack on Sequential Circuit Logic LockingGourav Takhar, Subhajit Roy. 21-24 [doi]
- A Novel Attack on Machine-Learning Resistant Physical Unclonable FunctionsDaniel Canaday, Wendson A. S. Barbosa, Andrew Pomerance. 25-28 [doi]
- System on Chip (SoC) Security Architecture Framework for Isolated Domains Against ThreatsSiam Haque, Shahnam Mirzaei. 29-32 [doi]
- Security Threats and Countermeasure Deployment Using Partial Reconfiguration in FPGA CAD ToolsSandeep Sunkavilli, Qiaoyan Yu. 33-36 [doi]
- Towards an Antivirus for Quantum ComputersSanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Yongshan Ding 0001, Jakub Szefer. 37-40 [doi]
- SecSoC: A Secure System on Chip Architecture for IoT DevicesAyman Hroub, Muhammad E. S. Elrabaa. 41-44 [doi]
- Characterizing Side-Channel Leakage of DNN Classifiers though Performance CountersSaikat Majumdar, Mohammad Hossein Samavatian, Radu Teodorescu. 45-48 [doi]
- Detecting Continuous Jamming Attack using Ultra-low Power RSSI CircuitAnkit Mittal, Aatmesh Shrivastava. 49-52 [doi]
- Secuirty Metrics for Logic CircuitsRuben Purdy, Danielle Duvalsaint, R. D. Shawn Blanton. 53-56 [doi]
- SpecPref: High Performing Speculative Attacks Resilient Hardware PrefetchersTarun Solanki, Biswabandan Panda. 57-60 [doi]
- pHGen: A pH-Based Key Generation Mechanism Using ISFETsElmira Moussavi, Dominik Sisejkovic, Fabian Brings, Daniyar Kizatov, Animesh Singh, Xuan-Thang Vu, Rainer Leupers, Sven Ingebrandt, Vivek Pachauri, Farhad Merchant. 61-64 [doi]
- Safeguarding Unmanned Aerial Vehicles Against Side Channel Analysis Via Motor Noise InjectionTimothy Radtke, Cristinel Ababei. 65-68 [doi]
- WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum CryptographyMarkku-Juhani O. Saarinen. 69-72 [doi]
- Chosen-Plaintext Attack on Energy-Efficient Hardware Implementation of GIFT-COFBYadi Zhong, Ujjwal Guin. 73-76 [doi]
- Error Correction Attacks on BACnet MS/TPTsion Yimer, Edmund Smith, Paige Harvey, Marcial Tienteu, Kevin T. Kornegay. 77-80 [doi]
- Insertion of random delay with context-aware dummy instructions generator in a RISC-V processorGaƫtan Leplus, Olivier Savry, Lilian Bossuet. 81-84 [doi]
- Contact PUF: Highly Stable Physical Unclonable Functions Based on Contact Failure Probability in 180 nm, 130 nm, and 28 nm CMOS ProcessesDuhyun Jeon, Dongmin Lee, Dong Kyue Kim, Byong-Deok Choi. 85-88 [doi]
- Efficient Targeted Bit-Flip Attack Against the Local Binary Pattern NetworkArman Roohi, Shaahin Angizi. 89-92 [doi]
- Efficient and Side-Channel Resistant Design of High-Security Ed448 on ARM Cortex-M4Mila Anastasova, Mojtaba Bisheh Niasar, Hwajeong Seo, Reza Azarderakhsh, Mehran Mozaffari Kermani. 93-96 [doi]
- Detecting Laser Fault Injection Attacks via Time-to-Digital Converter SensorsMohammad Ebrahimabadi, Suhee Sanjana Mehjabin, Raphael Viera, Sylvain Guilley, Jean-Luc Danger, Jean-Max Dutertre, Naghmeh Karimi. 97-100 [doi]
- True Random Number Generation with the Shift-register Reconvergent-Fanout (SiRF) PUFNafis Irtija, Eirini-Eleni Tsiropoulou, Cyrus Minwalla, Jim Plusquellic. 101-104 [doi]
- Dynamic Key Updates for LUT Locked DesignJakub Slowik, Gregory Williams, Rummah Albashir, Anthony Samagio, Geraldine Shirley Nicholas, Fareena Saqib. 105-108 [doi]
- PCB Component Detection for Hardware Assurance: A Feature Selection-based ApproachShajib Ghosh, Mohammad Tahsin Mostafiz, Suprith Gurudu, Shayan Taheri, Navid Asadizanjani. 109-112 [doi]
- Metrics for Assessing Security of System-on-ChipSujan Kumar Saha, Joel Mandebi Mbongue, Christophe Bobda. 113-116 [doi]
- FTC: A Universal Sensor for Fault Injection Attack DetectionMd Rafid Muttaki, Tao Zhang, Mark M. Tehranipoor, Farimah Farahmandi. 117-120 [doi]
- Hardware Trojan Detection at LUT: Where Structural Features Meet Behavioral CharacteristicsLingjuan Wu, Xuelin Zhang, Siyi Wang, Wei Hu. 121-124 [doi]
- Security Analysis of Delay-Based Strong PUFs with Multiple Delay LinesAnita Aghaie, Amir Moradi 0001, Johannes Tobisch, Nils Wisiol. 125-128 [doi]
- Mathematical Model of Strong Physically Unclonable Functions Based on Hybrid Boolean NetworksNoeloikeau F. Charlot, Daniel J. Gauthier, Daniel Canaday, Andrew Pomerance. 129-132 [doi]
- On the Feasibility of Training-time Trojan Attacks through Hardware-based Faults in MemoryKunbei Cai, Zhenkai Zhang, Fan Yao. 133-136 [doi]
- Identification and Classification of Corrupted PUF Responses via Machine LearningReshmi Suragani, Emiliia Nazarenko, Nikolaos Athanasios Anagnostopoulos, Nico Mexis, Elif Bilge Kavun. 137-140 [doi]
- Hardening Hardware Accelerartor Based CNN Inference Phase Against Adversarial NoisesTolulope A. Odetola, Adewale Adeyemo, Syed Rafay Hasan. 141-144 [doi]
- Global Attack and Remedy on IC-Specific Logic EncryptionAmin Rezaei 0001, Ava Hedayatipour, Hossein Sayadi, Mehrdad Aliasgari, Hai Zhou. 145-148 [doi]
- Evaluating the Impact of Hardware Faults on Program Execution in a Microkernel EnvironmentYohannes Belayneh Bekele, Daniel B. Limbrick. 149-152 [doi]
- Practical Performance of Analog Attack TechniquesVaibhav Venugopal Rao, Kyle Juretus, Ioannis Savidis. 153-156 [doi]
- Systolic Acceleration of Polynomial Multiplication for KEM Saber and Binary Ring-LWE Post-Quantum CryptographyTianyou Bao, Pengzhou He, Jiafeng Xie. 157-160 [doi]
- A Lightweight Mutual Authentication Protocol Based on Physical Unclonable FunctionsSaeed Abdolinezhad, Axel Sikora. 161-164 [doi]
- Oblivious Intrusion Detection SystemMahmoud AbdelHafeez, Mostafa Taha. 165-168 [doi]
- A Modeling Attack on the Sub-threshold Current Array PUFYun Liu, Yongliang Chen, Xiaole Cui. 169-172 [doi]
- Partial Reconfiguration for Run-time Memory Faults and Hardware Trojan Attacks DetectionYing Li, Lan Chen, Jian Wang, Guanfei Gong. 173-176 [doi]
- Securing Hardware Accelerator during High-level SynthesisDipanjan Roy, Sabiya Jani Shaik, Sonam Sharma. 177-180 [doi]
- PUF-based Secure Test Wrapper Design for Network-on-ChipYing Zhang, Yuanxiang Li, Xin Chen, Jizhong Yang, Yifeng Hua, Jiaoyan Yao. 181-184 [doi]