| Paper ID | TITLE |
| 4 | Secure Heterogeneous Multicore Architecture Design |
| 5 | Characterising a CPU Fault Attack Model via Run-Time Data Analysis |
| 7 | Automatic Generation of High-Performance Modular Multipliers for Arbitrary Mersenne Primes on FPGAs |
| 9 | Exploring Timing Side-channel Attacks on Path-ORAMs |
| 19 | Creating Security Primitive by Nanoscale Manipulation |
| 40 | A New Maskless Debiasing Method for Lightweight Physical Unclonable Functions |
| 42 | Using Computational Game Theory To Guide Verification and Security in Hardware Designs |
| 56 | When Good Protections Go Bad: Exploiting Anti-DoS Measures to Accelerate Rowhammer Attacks |
| 57 | Stateless Leakage Resiliency from NLFSRs |
| 61 | Take a Moment and have some t: Hypothesis Testing on Raw PUF Data |
| 64 | Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security |
| 69 | Physical Unclonable Functions and Dynamic Partial Reconfiguration for Security in Resource-Constrained Embedded Systems |
| 70 | Efficient Configurations for Block Ciphers with Unified ENC/DEC Paths |
| 72 | High Efficiency Power Side-Channel Attack Immunity using Noise Injection in Attenuated Signature Domain |
| 91 | AppSAT: Approximately Deobfuscating Integrated Circuits |
| 111 | New Clone-Detection Approach for RFID-Based Supply Chains |
| 128 | Reviving Instruction Set Randomization |
| 130 | A Stochastic All-Digital Weak Physically Unclonable Function for Analog/MixedSignal Applications |
| Paper ID | TITLE |
| 23 | Breaking Hardware-Assisted Flow Integrity Extension |
| 24 | Memory-Constrained Implementation of Lattice-based Encryption Scheme on Standard Java Card |
| 31 | A Novel Physiological Features-Assisted Architecture for Rapidly Distinguishing Health Problems from Hardware Trojan Attacks and Errors in Medical Devices |
| 43 | Towards a Memristive Hardware Secure Hash Function (MemHash) |
| 58 | INFECT: INcospicious FEC-based Trojan: a Hardware Attack on an 802.11a/g Wireless Network |
| 98 | Challenging On-Chip SRAM Security with Boot-State Statistics |
| 104 | Improving Reliability of Weak PUFs via Circuit Techniques to Enhance Mismatch |
| 115 | Photonic Side Channel Attacks Against RSA |
| Paper ID | TITLE |
| 3 | Ag Conductive Bridge RAMs for Physical Unclonable Functions |
| 8 | Fabrication Security and Trust of Domain-Specific ASIC Processors |
| 21 | Øzone: Efficient Execution with Zero Timing Leakage for Modern Microarchitectures |
| 25 | LWE-Based Lossless Computational Fuzzy Extractor for the IoT |
| 28 | Cache Timing Attacks on Recent Microarchitectures |
| 35 | Analyzing Security Vulnerabilities of Three-Dimensional Integrated Circuits |
| 37 | A Novel Offset Method for Improving Bitstring Quality of a Hardware-Embedded Delay PUF |
| 45 | Malicious CAN-message Attack against Advanced Driving Assistant System |
| 50 | Improving FPGA based SHA-3 structures |
| 54 | On Secure Implementations of Quantum-Resistant Supersingular Isogeny Diffie-Hellman |
| 60 | Protecting Analog Circuits with Parameter Biasing Obfuscation |
| 63 | Circuit Recognition with Deep Learning |
| 78 | Detection of Counterfeit ICs using Public Identification Sequences |
| 90 | Threshold Voltage Defined Multi-Input Camouflaged Gate |
| 95 | Platform Agnostic, Scalable, and Unobtrusive FPGA Gateway Implementation of Moving Target Defense over IPv6 (MT6D) |
| 100 | TTLock: Tenacious and Traceless Logic Locking |
| 101 | Exploiting Safe Error Based Leakage of RFID Authentication Protocol using Hardware Trojan Horse |
| 112 | Characterizing EEPROM for usage as a ubiquitous PUF source |
| 113 | On Designing Optimal Camouflaged Layouts |
| 121 | Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory |
| 124 | Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems |
| 126 | Synthesis of Hardware Sandboxes for Trojan Mitigation in Systems on Chip |