Thursday, May 3, 2018 | Time: 15:35 – 16:30

  • Hiding Secrets in Hardware: A quantifiable Approach
    Shahrzad Keshavarz

  • Secure and Efficient Big Data Management for ICs
    Sumaiya Shomaji, Janani Prakash, Damon Woodard and Domenic Forte

  • Recycled AMS counterfeit IC detection using LDO Aging degradation
    Sreeja Chowdhury, Troy Bryant, Nima Maghari and Domenic Forte

  • Counterfeit Integrated Circuit Detection by Image Processing based Package Texture and Indent Analysis
    Pallabi Ghosh

  • Thwarting Active Side-Channel Attacks of Ring Polynomial Multiplication in Z/pZ[x]/x^n+1 for Post-quantum Cryptography Benchmarked on ASIC
    Ausmita Sarker, Mehran Mozaffari Kermani and Reza Azarderakhsh

  • Detecting Timing Leakage Using the Model of Information Flow
    Armaiti Ardeshiricham and Ryan Kastner

  • Multi-Mode Micromechanical Resonant Tags for Traceability and Authentication Applications
    Angela Newsome, Mehrdad Ramezani, Mayur Ghate, Fengchao Zhang, Swarup Bhunia and Roozbeh Tabrizian

  • Detection of Recycled Flash Chip using Timing Characteristics
    Preeti Kumari, Biswajit Ray and Md Tauhidur Rahman

  • Design of a Reconfigurable Chaos Gate with Enhanced Functionality Space in 65nm CMOS
    Aysha Shanta, Md Badruddoja Majumder, Md Sakib Hasan, Mesbah Uddin and Garrett Rose

  • An Entropy Analysis based Intrusion Detection System for Controller Area Network in Vehicles
    Qian Wang

  • Camouflaged Logic Locking for Securing the Monolithic Three-Dimensional Integrated Circuits
    Jaya Dofe and Qiaoyan Yu

  • Scan Chain based Hardware Security
    Xi Chen

  • Determining an ARM Microprocessor’s Vulnerability through Fault Injection and ACE Analysis using the gem5 Simulator
    Katrina Rosemond

  • Physical Layer Security with RF DNA Authentication
    Asia Mason and Michel Reece

  • Intrusion Detection for Sensor Node in Internet of Things
    Madiha Gul and Charles Kim

  • Micro-Architectural Attacks and Countermeasures on Public-key Cryptosystems Using Performance Counters
    Sarani Bhattacharya and Debdeep Mukhopadhyay

  • Security in NVM RRAM based PUF’s
    Anastasiya Chapko, Thomas Schultz, Andrew Rush and Rashmi Jha

  • Side-Channel Hardware Trojan
    Samaneh Ghandali

  • Fault-Assisted Side-Channel Analysis of Masked Implementations
    Yuan Yao

  • Secure Intermittent Computing Protocol
    Archanaa Santhana Krishnan

  • Key Bit-dependent Attack on a Protected PKC using a Single Electromagnetic Trace
    Bo-Yeon Sim and Dong-Guk Han

  • Detecting Hardware Trojans in RTL using Artificial Immune System-based Algorithms
    Farhath Zareen and Robert Karam

  • A Hardware Trojan design on FPGA based Cryptographic Key Generation: Impact and Detection
    Vidya Govindan

  • A Verifiable Hardware Accelerator for Matrix Multiplication
    Maria Isabel Mera Collantes and Siddharth Garg

  • Quantum Resistance Cryptography for Embedded Environments
    Roberta Faux, Karin Niles, Rino Sanchez and John Wade

  • ReRAM-based Accelerator for Generative Adversarial Networks
    Li Bing, Fan Chen, Linghao Song, Yiran Chen and Hai Li