Abstract is missing.
- Keynotes: Towards Self-Explaining Digital Systems: A Design Methodology for the Next GenerationRolf Drechsler. [doi]
- Towards Self-Explaining Digital Systems: A Design Methodology for the Next GenerationRolf Drechsler, Christoph Lüth, Görschwin Fey, Tim Güneysu. 1-6 [doi]
- Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography AlgorithmsAdrien Facon, Sylvain Guilley, Matthieu Lec'Hvien, Alexander Schaub 0001, Youssef Souissi. 7-12 [doi]
- Reverse Engineering of Cryptographic Cores by Structural Interpretation Through Graph AnalysisMichael Werner, Bernhard Lippmann, Johanna Baehr, Helmut Gräb. 13-18 [doi]
- Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer AttacksAlessandro Barenghi, Luca Breveglieri, Niccolò Izzo, Gerardo Pelosi. 19-24 [doi]
- Authentication of Microcontroller Board Using Non-Invasive EM Emission TechniqueMosabbah Mushir Ahmed, David Hély, Etienne Perret, Nicolas Barbot, Romain Siragusa, Maxime Bernier, Frédéric Garet. 25-30 [doi]
- On the Mitigation of Hardware Trojan Attacks in Embedded Processors by Exploiting a Hardware-Based ObfuscatorAndrea Marcelli, Ernesto Sánchez 0001, Luca Sasselli, Giovanni Squillero. 31-37 [doi]
- Lightweight PUF-Based Authentication Protocol for IoT DevicesYildiran Yilmaz, Steve R. Gunn, Basel Halak. 38-43 [doi]
- Security Analysis of Chaotic Baker MapsAmira Elhamshary, Yehea Ismail, Said Elkhamy. 44-47 [doi]
- Architectural Diversity: Bio-Inspired Hardware Security for FPGAsShakil Mahmud, Brooks Olney, Robert Karam. 48-51 [doi]
- A Machine Learning Attacks Resistant Two Stage Physical Unclonable Functions DesignHaibo Su, Mark Zwolinski, Basel Halak. 52-55 [doi]
- Hardware Trojan Detection and Functionality Determination for Soft IPsThao Le, Lucas Weaver, Jia Di, Shaojie Zhang, Yier Jin. 56-61 [doi]
- Property Based Formal Security Verification for Hardware Trojan DetectionMaoyuan Qin, Wei Hu, Dejun Mu, Yu Tai. 62-67 [doi]
- A New Secure Stream Cipher for Scan Chain EncryptionMathieu Da Silva, Emanuele Valea, Marie-Lise Flottes, Sophie Dupuis, Giorgio Di Natale, Bruno Rouzeyre. 68-73 [doi]
- Pre-silicon Embedded System Evaluation as New EDA Tool for Security VerificationSofiane Takarabt, Kais Chibani, Adrien Facon, Sylvain Guilley, Yves Mathieu, Laurent Sauvage, Youssef Souissi. 74-79 [doi]
- Using Physical and Functional Comparisons to Assure 3rd-Party IP for Modern FPGAsAdam Hastings, Sean Jensen, Jeffrey Goeders, Brad L. Hutchings. 80-86 [doi]
- Hardware Security Evaluation Platform for MCU-Based Connected Devices: Application to Healthcare IoTZahra Kazemi, Athanasios Papadimitriou, David Hély, Mahdi Fazeli, Vincent Beroulle. 87-92 [doi]
- Physical Inspection & Attacks: New Frontier in Hardware SecurityM. Tanjidur Rahman, Qihang Shi, Shahin Tajik, Hao-Ting Shen, Damon L. Woodard, Mark Tehranipoor, Navid Asadizanjani. 93-102 [doi]