Congratulations 2016 Accepted Papers!

Regular Papers

ID TITLE
72 Large Laser Spots and Fault Sensitivity Analysis
110 UCR: Unclonable Chipless RFID Tag
27 A Key-centric Processor Architecture for Secure Computing
111 Robust Privacy-preserving Fingerprint Authentication
116 A Layout-driven Framework to Assess Vulnerability of ICs to Microprobing Attacks
43 A New Approach for Rowhammer Attacks
49 An Area Optimized Serial Implementation of ICEPOLE Authenticated Encryption Scheme
60 A Highly Reliable and Tamper-Resistant RRAM PUF: Design and Experimental Validation
96 Machine Learning Resistant Strong PUF: Possible or a Pipe Dream?
121 Parsimonious Design Strategy for Linear Layers with High Diffusion in Block Ciphers
35 LEDPUF: Stability-Guaranteed Physical Unclonable Functions through Locally Enhanced Defectivity
74 GenMatch: Secure DNA Compatibility Testing
130 A Zero-cost Approach to Detect Recycled SoCs Using Embedded SRAM
59 IP Core Protection using Voltage-Controlled Side-Channel Receivers
5 Hardware Security Risk Assessment: A Case Study
14 Redirecting DRAM Memory Pages: Examining the Threat of System Memory Hardware Trojans
21 Iterating Von Neumann's Post-Processing under Hardware Constraints
85 A Separation and Protection Scheme for On-chip Memory Blocks in FPGAs
44 Hardware-based Workload Forensics: Process Reconstruction via TLB Monitoring
107 Controlling your Control Flow Graph
113 Round Gating for Low Energy Block Ciphers
13 A Secure Camouflaged Threshold Voltage Defined Logic Family
58 Classification Algorithms for Template Matching
65 SARLock: SAT Attack Resistant Logic Locking
66 The Other Side of The Coin: Analyzing Software Encoding Schemes Against Fault Injection Attacks
98 A Novel Security Technique for Generating Truly Random and Reliable Reconfigurable ROPUF-Based Cryptographic Keys

Poster Presentations

ID TITLE
81 Functional Polymorphism for Intellectual Property Protection
3 The Conjoined Microprocessor
114 Low-Area Hardware Implementations of CLOC, SILC and AES-OTR
34 Functional Block Identification in Circuit Design Recovery
54 Robust Hardware True Random Number Generators using DRAM Remanence Effects
9 Blinded random corruption attacks: memory encryption is not enough
30 Trust Games: How Game Theory Can Guide the Development of Hardware Trojan Detection Methods
38 ACBuilder: A Tool for Hardware Architecture Security Evaluation
56 On the Problems of Realizing Reliable and Efficient Ring Oscillator PUFs on FPGAs
103 Model Checking to Find Vulnerabilities in an Instruction Set Architecture
133 Scalable and privacy-preserving outsourcing of learning algorithms
15 Fast and Scalable Security Support for Directory-Based Distributed Shared Memory
42 Rejecting Unauthentic 802.15.4 Frames on the fly
108 Adaptive Real-time Trojan Detection Framework through Machine Learning
123 Scalable SoC Trust Verification using Integrated Theorem Proving and Model Checking
53 Information Leakage behind the Curtain: Abusing Anti-EMI Features for Covert Communication
69 Granularity and detection capability of an adaptive embedded Hardware Trojan detection system
99 Electronic Forensic Techniques for Manufacturer Attribution
47 Integrated All-Digital Low-dropout Regulator as a Countermeasure to Power Attack in Encryption Engines