Abstract is missing.
- Using outliers to detect stealthy hardware trojan triggering?Papa-Sidy Ba, Sophie Dupuis, Marie-Lise Flottes, Giorgio Di Natale, Bruno Rouzeyre. 1-6 [doi]
- Revision debug with non-linear version history in regression verificationJohn Adler, Ryan Berryhill, Andreas G. Veneris. 1-6 [doi]
- New architecture of the object-oriented functional coverage mechanism for digital verificationMarek Cieplucha, Witold A. Pleskacz. 1-6 [doi]
- On fault injections for early security evaluation vs. laser-based attacksRégis Leveugle, A. Chahed, Paolo Maistri, Athanasios Papadimitriou, David Hély, Vincent Beroulle. 1-6 [doi]
- In-situ slack monitors: taking up the challenge of on-die monitoring of variability and reliabilityAhmed Benhassain, Souhir Mhira, Florian Cacho, Vincent Huard, Lorena Anghel. 1-5 [doi]
- RRAM based cell for hardware security applicationsDaniel Arumí, Salvador Manich, Rosa Rodríguez-Montañés. 1-6 [doi]
- A Digital Memristor Emulator for FPGA-Based Artificial Neural NetworksIoannis Vourkas, Angel Abusleme, Vasileios G. Ntinas, Georgios Ch. Sirakoulis, Antonio Rubio. 1-4 [doi]
- Simulation-based verification of large-integer arithmetic circuitsNejmeddine Alimi, Younes Lahbib, Mohsen Machhout, Rached Tourki. 1-6 [doi]
- Secure Path VerificationGianpiero Cabodi, Paolo Camurati, Sebastiano F. Finocchiaro, Carmelo Loiacono, Francesco Savarese, Danilo Vendraminetto. 1-6 [doi]
- MaskVer: a tool helping designers detect flawed masking implementationsMichael Tempelmeier, Georg Sigl. 1-6 [doi]
- Counterexample-guided diagnosisHeinz Riener, Görschwin Fey. 1-6 [doi]