


default search action
HOST 2022: McLean, VA, USA
- IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2022, McLean, VA, USA, June 27-30, 2022. IEEE 2022, ISBN 978-1-6654-8532-6

- Yashika Verma, Dixit Kumar, Biswabandan Panda

:
EnclaveSim: A Micro-architectural Simulator with Enclave Support. 1-4 - Nils Wisiol:

Towards Attack Resilient Delay-Based Strong PUFs. 5-8 - Nitin Pundir

, Henian Li, Lang Lin, Norman Chang, Farimah Farahmandi, Mark Tehranipoor:
Security Properties Driven Pre-Silicon Laser Fault Injection Assessment. 9-12 - Kimia Zamiri Azar, Hadi Mardani Kamali, Farimah Farahmandi, Mark Tehranipoor:

Warm Up before Circuit De-obfuscation? An Exploration through Bounded-Model-Checkers. 13-16 - Lang Lin, Jimin Wen, Harsh Shrivastav, Weike Li, Hua Chen, Gang Ni, Sreeja Chowdhury, Calvin Chow, Norman Chang:

Layout-level Vulnerability Ranking from Electromagnetic Fault Injection. 17-20 - Gourav Takhar, Subhajit Roy:

Structural Analysis Attack on Sequential Circuit Logic Locking. 21-24 - Daniel Canaday, Wendson A. S. Barbosa, Andrew Pomerance:

A Novel Attack on Machine-Learning Resistant Physical Unclonable Functions. 25-28 - Siam Haque, Shahnam Mirzaei

:
System on Chip (SoC) Security Architecture Framework for Isolated Domains Against Threats. 29-32 - Sandeep Sunkavilli, Qiaoyan Yu:

Security Threats and Countermeasure Deployment Using Partial Reconfiguration in FPGA CAD Tools. 33-36 - Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Yongshan Ding

, Jakub Szefer:
Towards an Antivirus for Quantum Computers. 37-40 - Ayman Hroub, Muhammad E. S. Elrabaa:

SecSoC: A Secure System on Chip Architecture for IoT Devices. 41-44 - Saikat Majumdar, Mohammad Hossein Samavatian, Radu Teodorescu:

Characterizing Side-Channel Leakage of DNN Classifiers though Performance Counters. 45-48 - Ankit Mittal

, Aatmesh Shrivastava:
Detecting Continuous Jamming Attack using Ultra-low Power RSSI Circuit. 49-52 - Ruben Purdy, Danielle Duvalsaint, R. D. Shawn Blanton:

Secuirty Metrics for Logic Circuits. 53-56 - Tarun Solanki, Biswabandan Panda

:
SpecPref: High Performing Speculative Attacks Resilient Hardware Prefetchers. 57-60 - Elmira Moussavi, Dominik Sisejkovic, Fabian Brings, Daniyar Kizatov, Animesh Singh, Xuan Thang Vu

, Rainer Leupers, Sven Ingebrandt
, Vivek Pachauri
, Farhad Merchant:
pHGen: A pH-Based Key Generation Mechanism Using ISFETs. 61-64 - Timothy Radtke, Cristinel Ababei:

Safeguarding Unmanned Aerial Vehicles Against Side Channel Analysis Via Motor Noise Injection. 65-68 - Markku-Juhani O. Saarinen

:
WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography. 69-72 - Yadi Zhong, Ujjwal Guin

:
Chosen-Plaintext Attack on Energy-Efficient Hardware Implementation of GIFT-COFB. 73-76 - Tsion Yimer, Edmund Smith, Paige Harvey, Marcial Tienteu, Kevin T. Kornegay

:
Error Correction Attacks on BACnet MS/TP. 77-80 - Gaëtan Leplus, Olivier Savry, Lilian Bossuet:

Insertion of random delay with context-aware dummy instructions generator in a RISC-V processor. 81-84 - Duhyun Jeon, Dongmin Lee, Dong Kyue Kim, Byong-Deok Choi:

Contact PUF: Highly Stable Physical Unclonable Functions Based on Contact Failure Probability in 180 nm, 130 nm, and 28 nm CMOS Processes. 85-88 - Arman Roohi, Shaahin Angizi:

Efficient Targeted Bit-Flip Attack Against the Local Binary Pattern Network. 89-92 - Mila Anastasova, Mojtaba Bisheh-Niasar, Hwajeong Seo, Reza Azarderakhsh, Mehran Mozaffari Kermani

:
Efficient and Side-Channel Resistant Design of High-Security Ed448 on ARM Cortex-M4. 93-96 - Mohammad Ebrahimabadi, Suhee Sanjana Mehjabin

, Raphael Viera
, Sylvain Guilley, Jean-Luc Danger, Jean-Max Dutertre, Naghmeh Karimi:
Detecting Laser Fault Injection Attacks via Time-to-Digital Converter Sensors. 97-100 - Nafis Irtija

, Eirini-Eleni Tsiropoulou, Cyrus Minwalla, Jim Plusquellic:
True Random Number Generation with the Shift-register Reconvergent-Fanout (SiRF) PUF. 101-104 - Jakub Slowik, Gregory Williams, Rummah Albashir, Anthony Samagio, Geraldine Shirley Nicholas, Fareena Saqib:

Dynamic Key Updates for LUT Locked Design. 105-108 - Shajib Ghosh, Mohammad Tahsin Mostafiz, Suprith Gurudu, Shayan Taheri, Navid Asadizanjani:

PCB Component Detection for Hardware Assurance: A Feature Selection-based Approach. 109-112 - Sujan Kumar Saha, Joel Mandebi Mbongue, Christophe Bobda:

Metrics for Assessing Security of System-on-Chip. 113-116 - Md Rafid Muttaki

, Tao Zhang, Mark Tehranipoor, Farimah Farahmandi:
FTC: A Universal Sensor for Fault Injection Attack Detection. 117-120 - Lingjuan Wu, Xuelin Zhang

, Siyi Wang, Wei Hu:
Hardware Trojan Detection at LUT: Where Structural Features Meet Behavioral Characteristics. 121-124 - Anita Aghaie, Amir Moradi

, Johannes Tobisch, Nils Wisiol:
Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines. 125-128 - Noeloikeau F. Charlot, Daniel J. Gauthier, Daniel Canaday, Andrew Pomerance:

Mathematical Model of Strong Physically Unclonable Functions Based on Hybrid Boolean Networks. 129-132 - Kunbei Cai

, Zhenkai Zhang, Fan Yao
:
On the Feasibility of Training-time Trojan Attacks through Hardware-based Faults in Memory. 133-136 - Reshmi Suragani, Emiliia Nazarenko, Nikolaos Athanasios Anagnostopoulos

, Nico Mexis
, Elif Bilge Kavun:
Identification and Classification of Corrupted PUF Responses via Machine Learning. 137-140 - Tolulope A. Odetola, Adewale Adeyemo, Syed Rafay Hasan:

Hardening Hardware Accelerartor Based CNN Inference Phase Against Adversarial Noises. 141-144 - Amin Rezaei, Ava Hedayatipour, Hossein Sayadi, Mehrdad Aliasgari, Hai Zhou:

Global Attack and Remedy on IC-Specific Logic Encryption. 145-148 - Yohannes Belayneh Bekele, Daniel B. Limbrick

:
Evaluating the Impact of Hardware Faults on Program Execution in a Microkernel Environment. 149-152 - Vaibhav Venugopal Rao, Kyle Juretus, Ioannis Savidis:

Practical Performance of Analog Attack Techniques. 153-156 - Tianyou Bao

, Pengzhou He, Jiafeng Xie:
Systolic Acceleration of Polynomial Multiplication for KEM Saber and Binary Ring-LWE Post-Quantum Cryptography. 157-160 - Saeed Abdolinezhad, Axel Sikora:

A Lightweight Mutual Authentication Protocol Based on Physical Unclonable Functions. 161-164 - Mahmoud AbdelHafeez, Mostafa Taha:

Oblivious Intrusion Detection System. 165-168 - Yun Liu, Yongliang Chen, Xiaole Cui:

A Modeling Attack on the Sub-threshold Current Array PUF. 169-172 - Ying Li, Lan Chen, Jian Wang, Guanfei Gong:

Partial Reconfiguration for Run-time Memory Faults and Hardware Trojan Attacks Detection. 173-176 - Dipanjan Roy, Sabiya Jani Shaik, Sonam Sharma

:
Securing Hardware Accelerator during High-level Synthesis. 177-180 - Ying Zhang, Yuanxiang Li, Xin Chen, Jizhong Yang, Yifeng Hua, Jiaoyan Yao:

PUF-based Secure Test Wrapper Design for Network-on-Chip. 181-184

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














