default search action
HOST 2020: San Jose, CA, USA
- 2020 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, San Jose, CA, USA, December 7-11, 2020. IEEE 2020, ISBN 978-1-7281-7405-1
- Luong N. Nguyen, Baki Berkay Yilmaz, Milos Prvulovic, Alenka G. Zajic:
A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan Detection. 1-12 - Antoine Loiseau, Maxime Lecomte, Jacques J. A. Fournier:
Template Attacks against ECC: practical implementation against Curve25519. 13-22 - Muhammad Arsath K. F, Vinod Ganesan, Rahul Bodduna, Chester Rebeiro:
PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance. 23-34 - Zihao Zhan, Zhenkai Zhang, Xenofon D. Koutsoukos:
BitJabber: The World's Fastest Electromagnetic Covert Channel. 35-45 - Benjamin Hettwer, Tobias Horn, Stefan Gehrer, Tim Güneysu:
Encoding Power Traces as Images for Efficient Side-Channel Analysis. 46-56 - Lauren Biernacki, Mark Gallagher, Valeria Bertacco, Todd M. Austin:
Thwarting Control Plane Attacks with Displaced and Dilated Address Spaces. 57-68 - Ahmed A. Ayoub, Mark D. Aagaard:
Application-Specific Instruction Set Architecture for an Ultralight Hardware Security Module. 69-79 - Mahmoud Khalafalla, Mahmoud A. Elmohr, Catherine H. Gebotys:
Going Deep: Using deep learning techniques with simplified mathematical models against XOR BR and TBR PUFs (Attacks and Countermeasures). 80-90 - Wei Yan, Huifeng Zhu, Zhiyuan Yu, Fatemeh Tehranipoor, John A. Chandy, Ning Zhang, Xuan Zhang:
Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory. 91-101 - Franz-Josef Streit, Florian Fritz, Andreas Becher, Stefan Wildermann, Stefan Werner, Martin Schmidt-Korth, Michael Pschyklenk, Jürgen Teich:
Secure Boot from Non-Volatile Memory for Programmable SoC Architectures. 102-110 - Bashir M. Sabquat Bahar Talukder, Vineetha Menon, Biswajit Ray, Tempestt J. Neal, Md. Tauhidur Rahman:
Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin. 111-121 - Elmira Karimi, Yunsi Fei, David R. Kaeli:
Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU. 122-131 - Joseph Sweeney, V. Mohammed Zackriya, Samuel Pagliarini, Lawrence T. Pileggi:
Latch-Based Logic Locking. 132-141 - Toufique Morshed, Md Momin Al Aziz, Noman Mohammed:
CPU and GPU Accelerated Fully Homomorphic Encryption. 142-153 - Rachel Selina Rajarathnam, Yibo Lin, Yier Jin, David Z. Pan:
ReGDS: A Reverse Engineering Framework from GDSII to Gate-level Netlist. 154-163 - Calvin Deutschbein, Cynthia Sturton:
Evaluating Security Specification Mining for a CISC Architecture. 164-175 - Keyvan Ramezanpour, Paul Ampadu, William Diehl:
RS-Mask: Random Space Masking as an Integrated Countermeasure against Power and Fault Analysis. 176-187 - Yuan Yao, Tarun Kathuria, Baris Ege, Patrick Schaumont:
Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level. 188-196 - Anuj Dubey, Rosario Cammarota, Aydin Aysu:
MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection. 197-208 - Honggang Yu, Haocheng Ma, Kaichen Yang, Yiqiang Zhao, Yier Jin:
DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage. 209-218 - Martin S. Kelly, Keith Mayes:
High Precision Laser Fault Injection using Low-cost Components. 219-228 - Victor Arribas, Felix Wegener, Amir Moradi, Svetla Nikova:
Cryptographic Fault Diagnosis using VerFI. 229-240 - Aikata, Banashri Karmakar, Dhiman Saha:
DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault. 241-251 - Michael Gruber, Matthias Probst, Michael Tempelmeier:
Statistical Ineffective Fault Analysis of GIMLI. 252-261 - M. Tanjidur Rahman, Shahin Tajik, M. Sazadur Rahman, Mark M. Tehranipoor, Navid Asadizanjani:
The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes. 262-272 - Ye Wang, Xiaodan Xi, Michael Orshansky:
Lattice PUF: A Strong Physical Unclonable Function Provably Secure against Machine Learning Attacks. 273-283 - Rabin Yu Acharya, Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte:
Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm. 284-294 - Rashmi S. Agrawal, Lake Bu, Michel A. Kinsy:
A Post-Quantum Secure Discrete Gaussian Noise Sampler. 295-304 - Orlando Arias, Dean Sullivan, Haoqi Shan, Yier Jin:
LAHEL: Lightweight Attestation Hardening Embedded Devices using Macrocells. 305-315 - Stefan Hristozov, Manuel Huber, Georg Sigl:
Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks. 316-327
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.