Thursday, May 3, 2018 | Time: 15:35 – 16:30
-
Hiding Secrets in Hardware: A quantifiable Approach
Shahrzad Keshavarz
-
Secure and Efficient Big Data Management for ICs
Sumaiya Shomaji, Janani Prakash, Damon Woodard and Domenic Forte
-
Recycled AMS counterfeit IC detection using LDO Aging degradation
Sreeja Chowdhury, Troy Bryant, Nima Maghari and Domenic Forte
-
Counterfeit Integrated Circuit Detection by Image Processing based Package Texture and Indent Analysis
Pallabi Ghosh
-
Thwarting Active Side-Channel Attacks of Ring Polynomial Multiplication in Z/pZ[x]/x^n+1 for Post-quantum Cryptography Benchmarked on ASIC
Ausmita Sarker, Mehran Mozaffari Kermani and Reza Azarderakhsh
-
Detecting Timing Leakage Using the Model of Information Flow
Armaiti Ardeshiricham and Ryan Kastner
-
Multi-Mode Micromechanical Resonant Tags for Traceability and Authentication Applications
Angela Newsome, Mehrdad Ramezani, Mayur Ghate, Fengchao Zhang, Swarup Bhunia and Roozbeh Tabrizian
-
Detection of Recycled Flash Chip using Timing Characteristics
Preeti Kumari, Biswajit Ray and Md Tauhidur Rahman
-
Design of a Reconfigurable Chaos Gate with Enhanced Functionality Space in 65nm CMOS
Aysha Shanta, Md Badruddoja Majumder, Md Sakib Hasan, Mesbah Uddin and Garrett Rose
-
An Entropy Analysis based Intrusion Detection System for Controller Area Network in Vehicles
Qian Wang
-
Camouflaged Logic Locking for Securing the Monolithic Three-Dimensional Integrated Circuits
Jaya Dofe and Qiaoyan Yu
-
Scan Chain based Hardware Security
Xi Chen
-
Determining an ARM Microprocessor’s Vulnerability through Fault Injection and ACE Analysis using the gem5 Simulator
Katrina Rosemond
-
Physical Layer Security with RF DNA Authentication
Asia Mason and Michel Reece
-
Intrusion Detection for Sensor Node in Internet of Things
Madiha Gul and Charles Kim
-
Micro-Architectural Attacks and Countermeasures on Public-key Cryptosystems Using Performance Counters
Sarani Bhattacharya and Debdeep Mukhopadhyay
-
Security in NVM RRAM based PUF’s
Anastasiya Chapko, Thomas Schultz, Andrew Rush and Rashmi Jha
-
Side-Channel Hardware Trojan
Samaneh Ghandali
-
Fault-Assisted Side-Channel Analysis of Masked Implementations
Yuan Yao
-
Secure Intermittent Computing Protocol
Archanaa Santhana Krishnan
-
Key Bit-dependent Attack on a Protected PKC using a Single Electromagnetic Trace
Bo-Yeon Sim and Dong-Guk Han
-
Detecting Hardware Trojans in RTL using Artificial Immune System-based Algorithms
Farhath Zareen and Robert Karam
-
A Hardware Trojan design on FPGA based Cryptographic Key Generation: Impact and Detection
Vidya Govindan
-
A Verifiable Hardware Accelerator for Matrix Multiplication
Maria Isabel Mera Collantes and Siddharth Garg
-
Quantum Resistance Cryptography for Embedded Environments
Roberta Faux, Karin Niles, Rino Sanchez and John Wade
-
ReRAM-based Accelerator for Generative Adversarial Networks
Li Bing, Fan Chen, Linghao Song, Yiran Chen and Hai Li