Abstract is missing.
- Using Hardware Performance Counters to Detect Control Hijacking AttacksMiao Yu, Basel Halak, Mark Zwolinski. 1-6 [doi]
- On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems: Clock Glitch AttacksZahra Kazemi, Athanasios Papadimitriou, Ioanna Souvatzoglou, Ehsan Aerabi, Mosabbah Mushir Ahmed, David Hély, Vincent Beroulle. 7-12 [doi]
- Nonlinear Product Codes for Reliability and SecurityBatya Karp, Ofer Amrani, Osnat Keren. 13-18 [doi]
- Two-Stage Architectures for Resilient Lightweight PUFsHaibo Su, Basel Halak, Mark Zwolinski. 19-24 [doi]
- On the Reliability of the Ring Oscillator Physically Unclonable FunctionsHonorio Martín, Elena Ioana Vatajelu, Giorgio Di Natale, Osnat Keren. 25-30 [doi]
- A Two-Flights Mutual Authentication for Energy-Constrained IoT DevicesYildiran Yilmaz, Basel Halak. 31-36 [doi]
- Secure Design Flow of FPGA Based RISC-V ImplementationAli Shuja Siddiqui, Geraldine Shirley, Shreya Bendre, Girija Bhagwat, Jim Plusquellic, Fareena Saqib. 37-42 [doi]
- A Comprehensive Approach to a Trusted Test InfrastructureMarc Merandat, Vincent Reynaud, Emanuele Valea, Jérôme Quévremont, Nicolas Valette, Paolo Maistri, Régis Leveugle, Marie-Lise Flottes, Sophie Dupuis, Bruno Rouzeyre, Giorgio Di Natale. 43-48 [doi]
- Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan DetectionArash Nejat, Zahra Kazemi, Vincent Beroulle, David Hély, Mahdi Fazeli. 49-54 [doi]
- Verification of Physical Chip Layouts Using GDSII Design DataAayush Singla, Bernhard Lippmann, Helmut Graeb. 55-60 [doi]
- Dynamic Adjustment of Test-Sequence Duration for Increasing the Functional CoverageZacharias Takakis, Dimitrios Mangiras, Chrysostomos Nicopoulos, Giorgos Dimitrakopoulos. 61-66 [doi]
- Electroforming-free Memristors for Hardware Security PrimitivesNan Du, Mahdi Kiani, Xianyue Zhao, Danilo Bürger, Oliver G. Schmidt, Ramona Ecke, Stefan E. Schulz, Heidemarie Schmidt, Ilia Polian. 67-70 [doi]