POSTERS

Session Chair: Qiaoyan Yu, University of New Hampshire

Tuesday May 3rd, 2016 | Time: 15:40 - 17:00

  1. Functional Polymorphism for Intellectual Property Protection
    Jeffrey McDonald - U. of South Alabama, AL, USA.
    Yong Kim - Air Force Research Lab, USA.
    Todd Andel - U. of South Alabama, AL, USA.
    James McVicar - TruBridge, USA.
    Miles Forbes - U. of South Alabama, AL, USA.

  2. The Conjoined Microprocessor
    Ehsan Aerabi - Iran U. of Science and Technology, Iran.
    A.Elhadi Amirouche - Sorbonne Universités – Université Paris II, France.
    Houda Ferradi, Sha Rémi Geraud, Naccache David and Jean Vuillemain - Ecole normale suprieure, France.

  3. Low-Area Hardware Implementations of CLOC, SILC and AES-OTR
    Subhadeep Banik, Andrey Bogdanov - Technical U.of Denmark, Denmark.
    Kazuhiko Minematsu - NEC Corporation, Japan.

  4. Functional Block Identification in Circuit Design Recovery
    Jacob Couch, Elizabeth Reilly, Morgan Schuyler and Brad Barrett - Johns Hopkins U., MD, USA.

  5. Robust Hardware True Random Number Generators using DRAM Remanence Effects
    Fatemeh Tehranipoor, Wei Yan and John Chandy - U. of Connecticut, CT, USA.

  6. Blinded random corruption attacks
    Shay Gueron - U. of Haifa, Israel.
    Rodrigo Branco - Intel Corporation, USA.

  7. Trust Games: How Game Theory Can Guide the Development of Hardware Trojan Detection Methods
    Jonathan Graf - Graf Research, USA.

  8. ACBuilder: A Tool for Hardware Architecture Security Evaluation
    Henrique Kawakami, Ricardo Dahab, Roberto Gallo - Unicamp, Brazil.
    David Ott and Hao-Chi Wong - Intel Corporation, USA.

  9. On the Problems of Realizing Reliable and Efficient Ring Oscillator PUFs on FPGAs
    Alexander Wild, Georg T. Becker - Ruhr-U. Bochum, Germany.
    Tim Güneysu - U. of Bremen & DFKI, Germany.

  10. Model Checking to Find Vulnerabilities in an Instruction Set Architecture
    Chris Bradfield - Weebly Inc., USA.
    Cynthia Sturton - U. of North Carolina at Chapel Hill, NC, USA.

  11. Scalable and privacy-preserving outsourcing of learning algorithms
    Azalia Mirhoseini, Farinaz Koushanfar - Rice U., TX, USA.
    Ahmad-Reza Sadeghi - Technische Universität Darmstadt, Germany.

  12. Fast and Scalable Security Support for Directory-Based Distributed Shared Memory
    Ofir Shwartz and Yitzhak Birk - Technion, Israel.

  13. Adaptive Real-time Trojan Detection Framework through Machine Learning
    Amey Kulkarni - U. of Maryland Baltimore County, MD, USA.
    Youngok Pino - Information Science Institute, USA.
    Tinoosh Mohsenin - U. of Maryland Baltimore County, MD, USA.

  14. Scalable SoC Trust Verification using Integrated Theorem Proving and Model Checking
    Xiaolong Guo, Raj Gautam Dutta - U. of Central Florida, FL, USA.
    Prabhat Mishra - U. of Florida, FL, USA.
    Yier Jin - U. of Central Florida, FL, USA.

  15. Information Leakage behind the Curtain: Abusing Anti-EMI Features for Covert Communication
    Johannes Bauer - Friedrich-Alexander Universität Erlangen-Nürnberg, Germany.
    Sebastian Schinzel - Münster University of Applied Sciences, Germany.
    Felix Freiling - Friedrich-Alexander Universität Erlangen-Nürnberg, Germany.
    Andreas Dewald - ERNW Research GmbH, Heidelberg, Germany.

  16. Granularity and detection capability of an adaptive embedded Hardware Trojan detection system
    Maxime Lecomte, Jacques Fournier - CEA Tech, France.
    Philippe Maurine - LIRMM, France.

  17. Electronic Forensic Techniques for Manufacturer Attribution
    Ryan Helinski, Ed Cole, Gideon Robertson, Jonathan Woodbridge, Lyndon Pierson - Sandia National Laboratories, USA.

  18. Integrated All-Digital Low-dropout Regulator as a Countermeasure to Power Attack in Encryption Engines
    Arvind Singh, Monodeep Kar, Saibal Mukhopadhyay - Georgia Tech, GA, USA.
    Anand Rajan and Vivek De - Intel Labs, OR, USA.

Click here for a list of important dates