| ID |
TITLE |
| 72 |
Large Laser Spots and Fault Sensitivity Analysis |
| 110 |
UCR: Unclonable Chipless RFID Tag |
| 27 |
A Key-centric Processor Architecture for Secure Computing |
| 111 |
Robust Privacy-preserving Fingerprint Authentication |
| 116 |
A Layout-driven Framework to Assess Vulnerability of ICs to Microprobing Attacks |
| 43 |
A New Approach for Rowhammer Attacks |
| 49 |
An Area Optimized Serial Implementation of ICEPOLE Authenticated Encryption Scheme |
| 60 |
A Highly Reliable and Tamper-Resistant RRAM PUF: Design and Experimental Validation |
| 96 |
Machine Learning Resistant Strong PUF: Possible or a Pipe Dream? |
| 121 |
Parsimonious Design Strategy for Linear Layers with High Diffusion in Block Ciphers |
| 35 |
LEDPUF: Stability-Guaranteed Physical Unclonable Functions through Locally Enhanced Defectivity |
| 74 |
GenMatch: Secure DNA Compatibility Testing |
| 130 |
A Zero-cost Approach to Detect Recycled SoCs Using Embedded SRAM |
| 59 |
IP Core Protection using Voltage-Controlled Side-Channel Receivers |
| 5 |
Hardware Security Risk Assessment: A Case Study |
| 14 |
Redirecting DRAM Memory Pages: Examining the Threat of System Memory Hardware Trojans |
| 21 |
Iterating Von Neumann's Post-Processing under Hardware Constraints |
| 85 |
A Separation and Protection Scheme for On-chip Memory Blocks in FPGAs |
| 44 |
Hardware-based Workload Forensics: Process Reconstruction via TLB Monitoring |
| 107 |
Controlling your Control Flow Graph |
| 113 |
Round Gating for Low Energy Block Ciphers |
| 13 |
A Secure Camouflaged Threshold Voltage Defined Logic Family |
| 58 |
Classification Algorithms for Template Matching |
| 65 |
SARLock: SAT Attack Resistant Logic Locking |
| 66 |
The Other Side of The Coin: Analyzing Software Encoding Schemes Against Fault Injection Attacks |
| 98 |
A Novel Security Technique for Generating Truly Random and Reliable Reconfigurable ROPUF-Based Cryptographic Keys |