Session Chair: Qiaoyan Yu, University of New Hampshire
Tuesday May 3rd, 2016 | Time: 15:40 - 17:00
-
Functional Polymorphism for Intellectual Property Protection
Jeffrey McDonald - U. of South Alabama, AL, USA.
Yong Kim - Air Force Research Lab, USA.
Todd Andel - U. of South Alabama, AL, USA.
James McVicar - TruBridge, USA.
Miles Forbes - U. of South Alabama, AL, USA.
-
The Conjoined Microprocessor
Ehsan Aerabi - Iran U. of Science and Technology, Iran.
A.Elhadi Amirouche - Sorbonne Universités – Université Paris II, France.
Houda Ferradi, Sha Rémi Geraud, Naccache David and Jean Vuillemain - Ecole normale suprieure, France.
-
Low-Area Hardware Implementations of CLOC, SILC and AES-OTR
Subhadeep Banik, Andrey Bogdanov - Technical U.of Denmark, Denmark.
Kazuhiko Minematsu - NEC Corporation, Japan.
-
Functional Block Identification in Circuit Design Recovery
Jacob Couch, Elizabeth Reilly, Morgan Schuyler and Brad Barrett - Johns Hopkins U., MD, USA.
-
Robust Hardware True Random Number Generators using DRAM Remanence Effects
Fatemeh Tehranipoor, Wei Yan and John Chandy - U. of Connecticut, CT, USA.
-
Blinded random corruption attacks
Shay Gueron - U. of Haifa, Israel.
Rodrigo Branco - Intel Corporation, USA.
-
Trust Games: How Game Theory Can Guide the Development of Hardware Trojan Detection Methods
Jonathan Graf - Graf Research, USA.
-
ACBuilder: A Tool for Hardware Architecture Security Evaluation
Henrique Kawakami, Ricardo Dahab, Roberto Gallo - Unicamp, Brazil.
David Ott and Hao-Chi Wong - Intel Corporation, USA.
-
On the Problems of Realizing Reliable and Efficient Ring Oscillator PUFs on FPGAs
Alexander Wild, Georg T. Becker - Ruhr-U. Bochum, Germany.
Tim Güneysu - U. of Bremen & DFKI, Germany.
-
Model Checking to Find Vulnerabilities in an Instruction Set Architecture
Chris Bradfield - Weebly Inc., USA.
Cynthia Sturton - U. of North Carolina at Chapel Hill, NC, USA.
-
Scalable and privacy-preserving outsourcing of learning algorithms
Azalia Mirhoseini, Farinaz Koushanfar - Rice U., TX, USA.
Ahmad-Reza Sadeghi - Technische Universität Darmstadt, Germany.
-
Fast and Scalable Security Support for Directory-Based Distributed Shared Memory
Ofir Shwartz and Yitzhak Birk - Technion, Israel.
-
Adaptive Real-time Trojan Detection Framework through Machine Learning
Amey Kulkarni - U. of Maryland Baltimore County, MD, USA.
Youngok Pino - Information Science Institute, USA.
Tinoosh Mohsenin - U. of Maryland Baltimore County, MD, USA.
-
Scalable SoC Trust Verification using Integrated Theorem Proving and Model Checking
Xiaolong Guo, Raj Gautam Dutta - U. of Central Florida, FL, USA.
Prabhat Mishra - U. of Florida, FL, USA.
Yier Jin - U. of Central Florida, FL, USA.
-
Information Leakage behind the Curtain: Abusing Anti-EMI Features for Covert Communication
Johannes Bauer - Friedrich-Alexander Universität Erlangen-Nürnberg, Germany.
Sebastian Schinzel - Münster University of Applied Sciences, Germany.
Felix Freiling - Friedrich-Alexander Universität Erlangen-Nürnberg, Germany.
Andreas Dewald - ERNW Research GmbH, Heidelberg, Germany.
-
Granularity and detection capability of an adaptive embedded Hardware Trojan detection system
Maxime Lecomte, Jacques Fournier - CEA Tech, France.
Philippe Maurine - LIRMM, France.
-
Electronic Forensic Techniques for Manufacturer Attribution
Ryan Helinski, Ed Cole, Gideon Robertson, Jonathan Woodbridge, Lyndon Pierson - Sandia National Laboratories, USA.
-
Integrated All-Digital Low-dropout Regulator as a Countermeasure to Power Attack in Encryption Engines
Arvind Singh, Monodeep Kar, Saibal Mukhopadhyay - Georgia Tech, GA, USA.
Anand Rajan and Vivek De - Intel Labs, OR, USA.
Click here for a list of important dates