


default search action
Journal of Hardware and Systems Security, Volume 2
Volume 2, Number 1, March 2018
- Muluken Hailesellasie, Syed Rafay Hasan:

Intrusion Detection in PLC-Based Industrial Control Systems Using Formal Verification Approach in Conjunction with Graphs. 1-14 - Md. Mahbub Alam

, Sreeja Chowdhury, Beomsoo Park, David Joseph Munzer, Nima Maghari, Mark Tehranipoor, Domenic Forte:
Challenges and Opportunities in Analog and Mixed Signal (AMS) Integrated Circuit (IC) Security. 15-32 - Yangdi Lyu, Prabhat Mishra:

A Survey of Side-Channel Attacks on Caches and Countermeasures. 33-50 - Sujit Rokka Chhetri, Sina Faezi, Nafiul Rashid, Mohammad Abdullah Al Faruque:

Manufacturing Supply Chain and Product Lifecycle Security in the Era of Industry 4.0. 51-68 - Chao Luo

, Yunsi Fei, Liwei Zhang, A. Adam Ding, Pei Luo, Saoni Mukherjee, David R. Kaeli:
Power Analysis Attack of an AES GPU Implementation. 69-82 - Arash Nejat

, David Hély, Vincent Beroulle:
ESCALATION: Leveraging Logic Masking to Facilitate Path-Delay-Based Hardware Trojan Detection Methods. 83-96
Volume 2, Number 2, June 2018
- Kejun Chen, Shuai Zhang, Zhikun Li, Yi Zhang, Qingxu Deng, Sandip Ray, Yier Jin

:
Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice. 97-110 - Bilgiday Yuce

, Patrick Schaumont
, Marc Witteman:
Fault Attacks on Secure Embedded Software: Threats, Design, and Evaluation. 111-130 - Vivek Venugopalan

, Cameron D. Patterson:
Surveying the Hardware Trojan Threat Landscape for the Internet-of-Things. 131-141 - Sarah Amir

, Bicky Shakya, Xiaolin Xu, Yier Jin, Swarup Bhunia, Mark Tehranipoor, Domenic Forte:
Development and Evaluation of Hardware Obfuscation Benchmarks. 142-161 - Debapriya Basu Roy, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Wei He, Debdeep Mukhopadhyay, Zakaria Najm, Xuan Thuy Ngo:

The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA. 162-178 - Sparsh Mittal, Ahmed Izzat Alsalibi:

A Survey of Techniques for Improving Security of Non-volatile Memories. 179-200
Volume 2, Number 3, September 2018
- Travis Meade, Kaveh Shamsi, Thao Le, Jia Di, Shaojie Zhang, Yier Jin

:
The Old Frontier of Reverse Engineering: Netlist Partitioning. 201-213 - Shahrzad Keshavarz

, Cunxi Yu
, Samaneh Ghandali, Xiaolin Xu, Daniel E. Holcomb:
Survey on Applications of Formal Methods in Reverse Engineering and Intellectual Property Protection. 214-224 - Vidya Govindan, Rajat Subhra Chakraborty

, Pranesh Santikellur
, Aditya Kumar Chaudhary:
A Hardware Trojan Attack on FPGA-Based Cryptographic Key Generation: Impact and Detection. 225-239 - Preston D. Frazier, E. Thomas Gilmore, Isaac J. Collins, Wardell E. Samotshozo, Mohamed F. Chouikha:

A Novel Counterfeit Detection Approach for Integrated Circuit Supply Chain Assurance. 240-250 - Taimour Wehbe

, Vincent John Mooney, Omer T. Inan, David C. Keezer
:
Securing Medical Devices Against Hardware Trojan Attacks Through Analog-, Digital-, and Physiological-Based Signatures. 251-265 - Sparsh Mittal

, S. B. Abhinaya, Manish Reddy, Irfan Ali:
A Survey of Techniques for Improving Security of GPUs. 266-285
Volume 2, Number 4, December 2018
- Domenic Forte, Yousef Iskander:

Guest Editorial: Hardware Reverse Engineering and Obfuscation. 287-288 - Johannes Obermaier

, Vincent Immler
:
The Past, Present, and Future of Physical Security Enclosures: From Battery-Backed Monitoring to PUF-Based Inherent Security and Beyond. 289-296 - Pascal Sasdrich

, Tim Güneysu
:
Exploring RFC 7748 for Hardware Implementation: Curve25519 and Curve448 with Side-Channel Protection. 297-313 - Sergei Skorobogatov

:
Hardware Security Implications of Reliability, Remanence, and Recovery in Embedded Memory. 314-321 - Raul Quijada

, Roger Dura, Jofre Pallares
, Xavier Formatje, Salvador Hidalgo, Francisco Serra-Graells:
Large-Area Automated Layout Extraction Methodology for Full-IC Reverse Engineering. 322-332 - Nidish Vashistha

, M. Tanjidur Rahman
, Hao-Ting Shen, Damon L. Woodard, Navid Asadizanjani, Mark Tehranipoor:
Detecting Hardware Trojans Inserted by Untrusted Foundry Using Physical Inspection and Advanced Image Processing. 333-344 - Elham Amini

, Anne Beyreuther, Norbert Herfurth, Alexander Steigert, Bernd Szyszka, Christian Boit:
Assessment of a Chip Backside Protection. 345-352

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














