| Demo NO. | TITLE |
| Demo 17 | Shanquan Tian, Ilias Giechaskiel, Wenjie Xiong and Jakub Szefer . Information Leakage through PCIe Contention in FPGA-Accelerated Cloud Environments |
| Demo 18 | Md Rafid Muttaki, Md Shahed Enamul Quadir, Mark Tehranipoor and Farimah Farahmandi. TDC sensor implementation as a Countermeasure to External EM Injection |
| Demo 19 | Pantea Kiaei, Yuan Yao, Ramazan Kaan Eren, Zhenyuan Liu and Patrick Schaumont. Saidoyoki: Multi-level Verification of Hardware Side-channel Vulnerabilities in SoC |
| Demo 21 | G Kalyana Abenanth and Mohankumar N. Enhancing the Security for Smart - Card in ARM based Embedded Systems |
| Demo 22 | MMd Sami Ul Islam Sami, Azim Uddin, Fahim Rahman, Farimah Farahmandi and Mark Tehranipoor. POCA: First Power-on Chip Authentication in Untrusted Foundry and Assembly |
| Demo 23 | Tao Zhang, Jungmin Park, Mark Tehranipoor and Farimah Farahmandi. TrustGuard: Enabling Power Profiling-Based Malware Detection on Embedded Devices |
| Demo 24 | Gregor Haas, Seetal Potluri and Aydin Aysu. openc8 Hardware Demo |
| Demo 25 | Giovanni Jana, Brooks Olney and Robert Karam. BioLogic Locking: Visualizing and Unlocking Obfuscated Circuits with Biometrics in FPGA |
| Demo 26 | Anupam Golder and Arijit Raychowdhury. Machine-Learning for Device Fingerprinting from Power Consumption Profile |
| Demo 27 | Shashank Kalluri, FPGA Stream Cipher Encryption using Chaotic Maps for Real-Time Processing |
| Demo 28 | Maximillian Panoff, Ty Van Roy and Yier Jin. AutoEM: Automatic Trace Collection and DataAnalysis for Electromagnetic Side Channel Security |
| Demo 29 | Sandeep Sunkavilli and Qiaoyan Yu, Demonstration of possible attacks and attack surfaces on FPGAs using CAD tools |
| Demo 30 | Yuqiao Zhang, Paschal Onyeka, Cyril Adjei and Ujjwal Guin. Ensuring End-to-End Traceability of ICs in Component Supply Chain using a Commercial Mobile Phone |
| Demo 31 | Mahmudul Hoque, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia and Tamzidul Hoque. TReC: Trojan-Resilient Computing in Untrusted Processors using Software Variants |
| Demo 32 | Mohammad Monjur, Joseph Heacock and Qiaoyan Yu. Analysis of Security Vulnerability of LoRaWAN Applied in Advanced Manufacturing |