default search action
Journal of Hardware and Systems Security, Volume 5
Volume 5, Number 1, March 2021
- Yildiran Yilmaz, Leonardo Aniello, Basel Halak:
ASSURE: A Hardware-Based Security Protocol for Resource-Constrained IoT Systems. 1-18 - Prudence Phillips, Olaide R. Afolabi, Hassan Salmani:
Experimental Data Anomaly Detection at Edge Sensor Nodes Using Physics Laws. 19-31 - Zenan Huang, Xiao Zhang, Jiebin Su, Zhixin Zhou, Hongyin Luo, Donghui Guo:
Reconfigurable TPM Implemented with Ultralow-Power Management in 28nm CMOS Process for IoT SoC Design. 32-44 - Chidhambaranathan Rajamanikkam, Rajesh J. S., Sanghamitra Roy, Koushik Chakraborty:
Understanding Security Threats in Emerging Neuromorphic Computing Architecture. 45-57 - Vianney Kengne Tchendji, Fabrice Mvah, Clémentin Tayou Djamégni, Yannick Florian Yankam:
E2BaSeP: Efficient Bayes Based Security Protocol Against ARP Spoofing Attacks in SDN Architectures. 58-74 - Nathanael R. Weidler, Ryan M. Gerdes, Thidapat Chantem:
On the Limitations of Obfuscating Redundant Circuits in Frustrating Hardware Trojan Implantation. 75-87
Volume 5, Number 2, June 2021
- Dibyendu Roy, Deepak Kumar Dalai:
An Observation of Non-randomness in NFSR-Based Stream Ciphers with Reduced Initialization Round. 89-102 - Claudius Pott, Philipp Jungklass, David Jacek Csejka, Thomas Eisenbarth, Marco Siebert:
Firmware Security Module. 103-113 - Erik J. Jorgensen, Frank T. Werner, Milos Prvulovic, Alenka G. Zajic:
Deep Learning Classification of Motherboard Components by Leveraging EM Side-Channel Signals. 114-126 - Bozhi Liu, Kemeng Chen, Minjun Seo, Janet Meiling Roveda, Roman Lysecky:
Methods and Analysis of Automated Trace Alignment Under Power Obfuscation in Side Channel Attacks. 127-142 - Corentin Lavaud, Robin Gerzaguet, Matthieu Gautier, Olivier Berder, Erwan Nogues, Stéphane Molton:
Whispering Devices: A Survey on How Side-channels Lead to Compromised Information. 143-168 - Jaspinder Kaur, Shirshendu Das:
A Survey on Cache Timing Channel Attacks for Multicore Processors. 169-189
Volume 5, Number 3, December 2021
- Bijoy Das, Amit Sardar, Swapan Maiti, Abhijit Das, Dipanwita Roy Chowdhury:
An Attack on Linear Scan Chains for Stream Ciphers and the Impossibility of Simple Countermeasures. 191-207 - Hossein Abbasi, Naser Ezzati-Jivan, Martine Bellaïche, Chamseddine Talhi, Michel R. Dagenais:
The Use of Anomaly Detection for the Detection of Different Types of DDoS Attacks in Cloud Environment. 208-222 - Sumaiya Shomaji, Zimu Guo, Fatemeh Ganji, Nima Karimian, Damon L. Woodard, Domenic Forte:
BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person. 223-236 - Wafi Danesh, Joshua Banago, Mostafizur Rahman:
Turning the Table: Using Bitstream Reverse Engineering to Detect FPGA Trojans. 237-246 - Vikash Kumar Rai, Somanath Tripathy, Jimson Mathew:
Design and Analysis of Reconfigurable Cryptographic Primitives: TRNG and PUF. 247-259 - Geraldine Shirley Nicholas, Ali Shuja Siddiqui, Sam Reji Joseph, Gregory Williams, Fareena Saqib:
A Secure Boot Framework with Multi-security Features and Logic-Locking Applications for Reconfigurable Logic. 260-268
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.