| Paper ID | TITLE | 
| 8 | Improving on State Register Identification in Sequential Hardware Reverse Engineering | 
| 12 | Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller | 
| 13 | In-depth Analysis and Enhancements of RO-PUFs with a Partial Reconfiguration Framework on Xilinx Zynq-7000 SoC FPGAs | 
| 15 | A Fetching Tale: Covert Communication With The Hardware Prefetcher | 
| 18 | MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation | 
| 25 | RATAFIA: Ransomware Analysis using Time And Frequency Informed Autoencoders | 
| 27 | CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution | 
| 34 | Detecting Recycled SoCs by Exploiting Aging Induced Biases in SRAM Cells | 
| 36 | Using Hardware Software Codesign for Optimised Implementations of High-Speed and Defence in Depth CEASAR Finalists | 
| 40 | STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis** | 
| 52 | Securing AES against Localized EM Attacks through Spatial Randomization of Dataflow | 
| 58 | A Statistical Fault Analysis Methodology for the Ascon Authenticated Cipher | 
| 63 | SURF: Joint Structural Functional Attack on Logic Locking | 
| 67 | SIA: Secure Intermittent Architecture for Off-the-Shelf Resource-Constrained Microcontrollers | 
| 73 | ENTT: A Family of Emerging NVM-based Trojan Triggers | 
| 75 | Extracting side-channel leakage from round unrolled implementations of lightweight ciphers | 
| 81 | FLATS: Filling Logic and Testing Spatially for FPGA Authentication and Tamper Detection | 
| 82 | QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment | 
| 83 | Golden Gates: A New hybrid Approach for Rapid Hardware Trojan Detection using Testing and Imaging## | 
| 88 | Exploiting Proximity Information in a Satisfiability Based Attack Against Split Manufactured Circuits | 
| 91 | High Capability and Low-Complexity: Novel Fault Detection Scheme for Finite Field Multipliers over $GF(2^m)$ based on MSPB## | 
| 98 | COTSknight: Practical Defense against Cache Timing Channel Attacks using COTS Hardware | 
| 102 | Efficient and Flexible Low-Power NTT for Lattice-Based Cryptography | 
| 108 | Using Power-Anomalies to Counter Evasive Micro-architectural Attacks in Embedded Systems** | 
| 110 | On the Impossibility of Approximation-Resilient Circuit Locking | 
** HOST 2019 Best Paper and Best Student paper Nominee
## HOST 2019 Best Paper Nominee