HOST 2022 | IEEE International Symposium on Hardware Oriented Security and Trust

HOST 2022 Hardware Demos - Session 2 (Wednesday June 29, 14:50 - 16:40)


Demo NO. TITLE
Demo 17 Shanquan Tian, Ilias Giechaskiel, Wenjie Xiong and Jakub Szefer . Information Leakage through PCIe Contention in FPGA-Accelerated Cloud Environments
Demo 18 Md Rafid Muttaki, Md Shahed Enamul Quadir, Mark Tehranipoor and Farimah Farahmandi. TDC sensor implementation as a Countermeasure to External EM Injection
Demo 19 Pantea Kiaei, Yuan Yao, Ramazan Kaan Eren, Zhenyuan Liu and Patrick Schaumont. Saidoyoki: Multi-level Verification of Hardware Side-channel Vulnerabilities in SoC
Demo 21 G Kalyana Abenanth and Mohankumar N. Enhancing the Security for Smart - Card in ARM based Embedded Systems
Demo 22 MMd Sami Ul Islam Sami, Azim Uddin, Fahim Rahman, Farimah Farahmandi and Mark Tehranipoor. POCA: First Power-on Chip Authentication in Untrusted Foundry and Assembly
Demo 23 Tao Zhang, Jungmin Park, Mark Tehranipoor and Farimah Farahmandi. TrustGuard: Enabling Power Profiling-Based Malware Detection on Embedded Devices
Demo 24 Gregor Haas, Seetal Potluri and Aydin Aysu. openc8 Hardware Demo
Demo 25 Giovanni Jana, Brooks Olney and Robert Karam. BioLogic Locking: Visualizing and Unlocking Obfuscated Circuits with Biometrics in FPGA
Demo 26 Anupam Golder and Arijit Raychowdhury. Machine-Learning for Device Fingerprinting from Power Consumption Profile
Demo 27 Shashank Kalluri, FPGA Stream Cipher Encryption using Chaotic  Maps for Real-Time Processing
Demo 28 Maximillian Panoff, Ty Van Roy and Yier Jin. AutoEM: Automatic Trace Collection and DataAnalysis for Electromagnetic Side Channel Security
Demo 29 Sandeep Sunkavilli and Qiaoyan Yu, Demonstration of possible attacks and attack surfaces on FPGAs using CAD tools
Demo 30 Yuqiao Zhang, Paschal Onyeka, Cyril Adjei and Ujjwal Guin. Ensuring End-to-End Traceability of ICs in Component Supply Chain using a Commercial Mobile Phone
Demo 31 Mahmudul Hoque, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia and Tamzidul Hoque. TReC: Trojan-Resilient Computing in Untrusted Processors using Software Variants
Demo 32 Mohammad Monjur, Joseph Heacock and Qiaoyan Yu. Analysis of Security Vulnerability of LoRaWAN Applied in Advanced Manufacturing