


default search action
HOST 2020: San Jose, CA, USA
- 2020 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, San Jose, CA, USA, December 7-11, 2020. IEEE 2020, ISBN 978-1-7281-7405-1

- Luong N. Nguyen, Baki Berkay Yilmaz, Milos Prvulovic, Alenka G. Zajic:

A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan Detection. 1-12 - Antoine Loiseau, Maxime Lecomte, Jacques J. A. Fournier:

Template Attacks against ECC: practical implementation against Curve25519. 13-22 - Muhammad Arsath K. F, Vinod Ganesan

, Rahul Bodduna, Chester Rebeiro:
PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance. 23-34 - Zihao Zhan, Zhenkai Zhang, Xenofon D. Koutsoukos:

BitJabber: The World's Fastest Electromagnetic Covert Channel. 35-45 - Benjamin Hettwer, Tobias Horn, Stefan Gehrer, Tim Güneysu

:
Encoding Power Traces as Images for Efficient Side-Channel Analysis. 46-56 - Lauren Biernacki

, Mark Gallagher, Valeria Bertacco, Todd M. Austin:
Thwarting Control Plane Attacks with Displaced and Dilated Address Spaces. 57-68 - Ahmed A. Ayoub, Mark D. Aagaard:

Application-Specific Instruction Set Architecture for an Ultralight Hardware Security Module. 69-79 - Mahmoud Khalafalla, Mahmoud A. Elmohr, Catherine H. Gebotys:

Going Deep: Using deep learning techniques with simplified mathematical models against XOR BR and TBR PUFs (Attacks and Countermeasures). 80-90 - Wei Yan, Huifeng Zhu, Zhiyuan Yu

, Fatemeh Tehranipoor, John A. Chandy
, Ning Zhang, Xuan Zhang:
Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory. 91-101 - Franz-Josef Streit

, Florian Fritz, Andreas Becher
, Stefan Wildermann, Stefan Werner, Martin Schmidt-Korth, Michael Pschyklenk, Jürgen Teich:
Secure Boot from Non-Volatile Memory for Programmable SoC Architectures. 102-110 - Bashir M. Sabquat Bahar Talukder, Vineetha Menon, Biswajit Ray, Tempestt J. Neal

, Md. Tauhidur Rahman:
Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin. 111-121 - Elmira Karimi, Yunsi Fei

, David R. Kaeli:
Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU. 122-131 - Joseph Sweeney, V. Mohammed Zackriya, Samuel Pagliarini

, Lawrence T. Pileggi
:
Latch-Based Logic Locking. 132-141 - Toufique Morshed, Md Momin Al Aziz, Noman Mohammed:

CPU and GPU Accelerated Fully Homomorphic Encryption. 142-153 - Rachel Selina Rajarathnam, Yibo Lin, Yier Jin

, David Z. Pan:
ReGDS: A Reverse Engineering Framework from GDSII to Gate-level Netlist. 154-163 - Calvin Deutschbein

, Cynthia Sturton:
Evaluating Security Specification Mining for a CISC Architecture. 164-175 - Keyvan Ramezanpour, Paul Ampadu, William Diehl:

RS-Mask: Random Space Masking as an Integrated Countermeasure against Power and Fault Analysis. 176-187 - Yuan Yao, Tarun Kathuria, Baris Ege, Patrick Schaumont

:
Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level. 188-196 - Anuj Dubey, Rosario Cammarota, Aydin Aysu:

MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection. 197-208 - Honggang Yu, Haocheng Ma, Kaichen Yang, Yiqiang Zhao, Yier Jin

:
DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage. 209-218 - Martin S. Kelly, Keith Mayes:

High Precision Laser Fault Injection using Low-cost Components. 219-228 - Victor Arribas

, Felix Wegener, Amir Moradi
, Svetla Nikova
:
Cryptographic Fault Diagnosis using VerFI. 229-240 - Aikata

, Banashri Karmakar
, Dhiman Saha
:
DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault. 241-251 - Michael Gruber

, Matthias Probst, Michael Tempelmeier
:
Statistical Ineffective Fault Analysis of GIMLI. 252-261 - M. Tanjidur Rahman, Shahin Tajik, M. Sazadur Rahman

, Mark Tehranipoor, Navid Asadizanjani:
The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes. 262-272 - Ye Wang, Xiaodan Xi

, Michael Orshansky:
Lattice PUF: A Strong Physical Unclonable Function Provably Secure against Machine Learning Attacks. 273-283 - Rabin Yu Acharya, Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte

:
Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm. 284-294 - Rashmi S. Agrawal, Lake Bu, Michel A. Kinsy:

A Post-Quantum Secure Discrete Gaussian Noise Sampler. 295-304 - Orlando Arias, Dean Sullivan, Haoqi Shan, Yier Jin

:
LAHEL: Lightweight Attestation Hardening Embedded Devices using Macrocells. 305-315 - Stefan Hristozov, Manuel Huber, Georg Sigl:

Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks. 316-327

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














