HOST | IEEE International Symposium on Hardware Oriented Security and Trust

List of Hardware Demos

  1. Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs using Genetic Algorithm
    Rabin Acharya, Sreeja Chowdhury, Fatemeh Ganji and Domenic Forte

  2. Hardware Demo of Thermistor and Solar Cell Based PUFs via a PUF based Controller Area Security Framework
    Carson Labrado and Himanshu Thapliyal

  3. FIAFINN: A Fault Injection Attack Framework on Binarized Neural Network Inference Accelerator
    Navid Khoshavi and Yu Bi

  4. SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware
    Milind Srivastava, Patanjali Slpsk, Indrani Roy, Chester Rebeiro, Aritra Hazra and Swarup Bhunia

  5. Demo of Fingerprinting Cloud FPGAs
    Shanquan Tian, Wenjie Xiong, Ilias Giechaskiel, Kasper Rasmussen and Jakub Szefer

  6. REFaaS: Remote Exploitation of FPGA-as-a-Service Platforms
    Nitin Pundir, Fahim Rahman, Farimah Farahmandi and Mark Tehranipoor

  7. FPGA Bitstream Camouflaging
    Ali Shuja Siddiqui, Yutian Gui, Geraldine Shirley Nicholas and Fareena Saqib

  8. High-level Synthesis Vulnerabilities: Information Leakage and Control Flow Violations
    Md Rafid Muttaki and Nitin Pundir

  9. Machine Learning Techniques in Side-channel Analysis
    Yutian Gui, Ali Shuja Siddiqui, Fareena Saqib and Chaitanya Mukund Bhure

  10. RASC v2: Enabling Remote Access to Side-Channels and Leveraging FPGA Acceleration for Real-Time Side-Channel Monitoring
    Yunkai Bai, Andrew Stern, Jungmin Park, Domenic Forte and Mark Tehranipoor

  11. Side-channel Power Resistance for Encryption Algorithms using Dynamic Partial Reconfiguration (SPREAD)
    Ivan Bow, Jithin Joseph, Fareena Saqib, Chintan Patel, Ryan Robucci and Jim Plusquellic

  12. SCNIFFER: Fully Automated, Low-cost, Efficient EM SCA Attack
    Josef A Danial, Debayan Das and Shreyas Sen

  13. Power Delivery Network based Board-Level Security Measurement and Side-Channel Attack
    Huifeng Zhu, Xiaolong Guo, Xuan Zhang and Yier Jin

  14. Statistical Ineffective Fault Analysis using FOBOS Glitch Generator
    Abubakr Abdulgadir, Keyvan Ramezanpour, William Diehl, Paul Ampadu and Jens-Peter Kaps

  15. Runtime Trust Evaluation Using On-Chip EM Sensors
    Jiaji He, Leibo Liu, Xiaolong Guo and Yier Jin

  16. Detecting Recycled SoCs by Exploiting Aging Induced Biases in Memory Cells
    Wendong Wang, Ujjwal Guin and Adit Singh

  17. End-to-End Traceability of ICs in Component Supply Chain for Fighting Against Recycling
    Yuqiao Zhang and Ujjwal Guin

  18. Hardware Demonstration of Watermarking of NAND Flash Memory Chips
    Mohammad Sadman Sakib, Aleksandar Milenković and Biswajit Ray

  19. SPARTA: Laser Probing Approach for Trojan Detection
    Andrew Stern, Shahin Tajik, Farimah Farahmandi and Mark Tehranipoor

  20. Current based Remote PCB Authentication using JTAG Architecture
    Shubhra Deb Paul and Swarup Bhunia

  21. MeXT-SE: A Design Tool to Generate Secure MPSoCs
    Md Jubaer Hossain Pantho, Sujan Saha and Christophe Bobda

  22. Automated Design and Synthesis of Secure System-on-Chip Architectures
    Atul Prasad Deb Nath, Kshitij Raj, Swarup Bhunia and Sandip Ray

  23. Machine Learning Bluetooth Transmission State Operation Verification via Monitoring the Transmission Pattern
    Abdelrahman Elkanishy, Abdel-Hameed Badawy and Paul Furth