Demo NO. |
TITLE |
Demo 17 |
Shanquan Tian, Ilias Giechaskiel, Wenjie Xiong and Jakub Szefer
. Information Leakage through PCIe Contention in FPGA-Accelerated Cloud Environments |
Demo 18 |
Md Rafid Muttaki, Md Shahed Enamul Quadir, Mark Tehranipoor and Farimah Farahmandi. TDC sensor implementation as a Countermeasure to External EM Injection |
Demo 19 |
Pantea Kiaei, Yuan Yao, Ramazan Kaan Eren, Zhenyuan Liu and Patrick Schaumont. Saidoyoki: Multi-level Verification of Hardware Side-channel Vulnerabilities in SoC |
Demo 21 |
G Kalyana Abenanth and Mohankumar N. Enhancing the Security for Smart - Card in ARM based Embedded Systems |
Demo 22 |
MMd Sami Ul Islam Sami, Azim Uddin, Fahim Rahman, Farimah Farahmandi and Mark Tehranipoor. POCA: First Power-on Chip Authentication in Untrusted Foundry and Assembly |
Demo 23 |
Tao Zhang, Jungmin Park, Mark Tehranipoor and Farimah Farahmandi. TrustGuard: Enabling Power Profiling-Based Malware Detection on Embedded Devices |
Demo 24 |
Gregor Haas, Seetal Potluri and Aydin Aysu. openc8 Hardware Demo |
Demo 25 |
Giovanni Jana, Brooks Olney and Robert Karam. BioLogic Locking: Visualizing and Unlocking Obfuscated Circuits with Biometrics in FPGA |
Demo 26 |
Anupam Golder and Arijit Raychowdhury. Machine-Learning for Device Fingerprinting from Power Consumption Profile |
Demo 27 |
Shashank Kalluri, FPGA Stream Cipher Encryption using Chaotic Maps for Real-Time Processing |
Demo 28 |
Maximillian Panoff, Ty Van Roy and Yier Jin. AutoEM: Automatic Trace Collection and DataAnalysis for Electromagnetic Side Channel Security |
Demo 29 |
Sandeep Sunkavilli and Qiaoyan Yu, Demonstration of possible attacks and attack surfaces on FPGAs using CAD tools |
Demo 30 |
Yuqiao Zhang, Paschal Onyeka, Cyril Adjei and Ujjwal Guin. Ensuring End-to-End Traceability of ICs in Component Supply Chain using a Commercial Mobile Phone |
Demo 31 |
Mahmudul Hoque, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia and Tamzidul Hoque. TReC: Trojan-Resilient Computing in Untrusted Processors using Software Variants |
Demo 32 |
Mohammad Monjur, Joseph Heacock and Qiaoyan Yu. Analysis of Security Vulnerability of LoRaWAN Applied in Advanced Manufacturing |