


default search action
HOST 2011: San Diego, CA, USA
- HOST 2011, Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, USA. IEEE Computer Society 2011, ISBN 978-1-4577-1059-9

- Victor Costan, Srinivas Devadas:

Security challenges and opportunities in adaptive and reconfigurable hardware. 1-5 - Thomas Feller, Sunil Malipatlolla, David Meister, Sorin A. Huss:

TinyTPM: A lightweight module aimed to IP protection and trusted embedded platforms. 6-11 - Eric Love, Yier Jin

, Yiorgos Makris
:
Enhancing security via provably trustworthy hardware intellectual property. 12-17 - Mainak Banga, Michael S. Hsiao:

ODETTE: A non-scan design-for-test methodology for Trojan detection in ICs. 18-23 - Mathilde Soucarros, Cécile Canovas-Dumas

, Jessy Clédière
, Philippe Elbaz-Vincent, Denis Réal:
Influence of the temperature on true random number generators. 24-27 - Katsuhiko Iwai, Mitsuru Shiozaki, Anh-Tuan Hoang, Kenji Kojima, Takeshi Fujino:

Implementation and verification of DPA-resistant cryptographic DES circuit using Domino-RSL. 28-33 - Michael Bilzor, Ted Huffmire, Cynthia E. Irvine, Timothy E. Levin:

Security Checkers: Detecting processor malicious inclusions at runtime. 34-39 - Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger:

Formal security evaluation of hardware Boolean masking against second-order attacks. 40-46 - Luis Angel D. Bathen, Nikil D. Dutt

:
TrustGeM: Dynamic trusted environment generation for chip-multiprocessors. 47-50 - Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Denis Réal:

Performance evaluation of protocols resilient to physical attacks. 51-56 - Sumio Morioka

, Toshiyuki Isshiki, Satoshi Obana, Yuichi Nakamura, Kazue Sako:
Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology. 57-62 - Dusko Karaklajic, Junfeng Fan, Ingrid Verbauwhede

:
Systematic security evaluation method against C safe-error attacks. 63-66 - Xuehui Zhang, Mohammad Tehranipoor:

Case study: Detecting hardware Trojans in third-party digital IP cores. 67-70 - Seetharam Narasimhan, Xinmu Wang, Dongdong Du, Rajat Subhra Chakraborty, Swarup Bhunia

:
TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection. 71-74 - Qiasi Luo, Yunsi Fei

:
Algorithmic collision analysis for evaluating cryptographic systems and side-channel attacks. 75-80 - Armin Krieg

, Christian Bachmann
, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Josef Haid:
Accelerating early design phase differential power analysis using power emulation techniques. 81-86 - Daisuke Fujimoto, Makoto Nagata

, Toshihiro Katashita, Akihiro T. Sasaki, Yohei Hori
, Akashi Satoh:
A fast power current analysis methodology using capacitor charging model for side channel attack evaluation. 87-92 - Nachiketh R. Potlapally:

Hardware security in practice: Challenges and opportunities. 93-98 - Nguyen Minh Huu, Bruno Robisson

, Michel Agoyan, Nathalie Drach:
Low-cost recovery for the code integrity protection in secure embedded processors. 99-104 - Jean DaRolt, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre:

New security threats against chips containing scan chain structures. 110 - Stephen M. Papa, William D. Casper, Suku Nair:

Placement of trust anchors in embedded computer systems. 111-116 - Peilin Song, Franco Stellari

, Dirk Pfeiffer, Jim Culp, Alan J. Weger, Alyssa Bonnoit, Bob Wisnieff, Marc Taubenblatt:
MARVEL - Malicious alteration recognition and verification by emission of light. 117-121 - Kevin Gotze:

A survey of frequently identified vulnerabilities in commercial computing semiconductors. 122-126 - Helena Handschuh:

Hardware intrinsic security based on SRAM PUFs: Tales from the industry. 127 - Zdenek Sid Paral, Srinivas Devadas:

Reliable and efficient PUF-based key generation using pattern matching. 128-133 - Qingqing Chen, György Csaba

, Paolo Lugli, Ulf Schlichtmann
, Ulrich Rührmair:
The Bistable Ring PUF: A new architecture for strong Physical Unclonable Functions. 134-141 - Raghavan Kumar, Harikrishnan Kumarapillai Chandrikakutty, Sandip Kundu:

On improving reliability of delay based Physically Unclonable Functions under temperature variations. 142-147 - Yang Li, Kazuo Ohta, Kazuo Sakiyama:

Revisit fault sensitivity analysis on WDDL-AES. 148-153 - Amir Moradi

, Oliver Mischke, Christof Paar:
Practical evaluation of DPA countermeasures on reconfigurable hardware. 154-160 - Alessandro Barenghi

, Guido Bertoni
, Andrea Palomba, Ruggero Susella:
A novel fault attack against ECDSA. 161-166

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














