| Paper ID | TITLE |
| 52 | Saikat Majumdar, Mohammad Samavatian and Radu Teodorescu. Characterizing Side-Channel Leakage of DNN Classifiers though Performance Counters |
| 26 | Mohammad Ebrahimabadi, Suhee Sanjana Mehjabin, Raphael Viera, Sylvain Guilley, Jean-Luc Danger, Jean-Max Dutertre and Naghmeh Karimi. Detecting Laser Fault Injection Attacks via Time-to-Digital Converter Sensors |
| 62 | Nafis Irtija, Eirini Eleni Tsiropoulou, Cyrus Minwalla and Jim Plusquellic. True Random Number Generation with the Shift-register Reconvergent-Fanout (SiRF) PUF |
| 45 | Jakub Slowik, Gregory Williams, Rummah Albashir, Anthony Samagaio, Fareena Saqib and Geraldine Nicholas. Dynamic Key Updates for LUT Locked Design |
| 55 | Shajib Ghosh, Mohammad Tahsin Mostafiz, Suprith Reddy Gurudu, Shayan Taheri and Navid Asadizanjani. PCB Component Detection for Hardware Assurance: A Feature Selection-based Approach |
| 56 | Sujan Kumar Saha, Joel Mandebi Mbongue and Christophe Bobda. Metrics for Assessing Security of System-on-Chip |
| 58 | Ayaz Akram. Accelerating Address Sanitization for Scientific Applications |
| 60 | Md Rafid Muttaki, Tao Zhang, Mark Tehranipoor and Farimah Farahmandi. FTC: A Universal Sensor for Fault Injection Attack Detection |
| 14 | Anita Aghaie, Amir Moradi, Johannes Tobisch and Nils Wisiol. Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines |
| 17 | Noeloikeau Charlot, Daniel Gauthier, Daniel Canaday and Andrew Pomerance. Mathematical Model of Strong Physically Unclonable Functions Based on Hybrid Boolean Networks |
| 20 | Kunbei Cai, Zhenkai Zhang and Fan Yao. On the Feasibility of Training-time Trojan Attacks Through Hardware-based Faults in Memory |
| 32 | Reshmi Suragani, Emiliia Nazarenko, Nikolaos Athanasios Anagnostopoulos, Nico Mexis and Elif Bilge Kavun. Identification and Classification of Corrupted PUF Responses via Machine Learning |
| 40 | Tolulope Odetola, Adewale Adeyemo and Syed Rafay Hasan. Hardening Hardware Accelerartor Based CNN Inference Phase against Adversarial Noises |
| 42 | Amin Rezaei, Ava Hedayatipour, Hossein Sayadi, Mehrdad Aliasgari and Hai Zhou. Global Attack and Remedy on IC-Specific Logic Encryption |
| 44 | Yohannes B. Bekele and Daniel B. Limbrick. Evaluating the Impact of Hardware Faults on Program Execution in a Microkernel Environment |
| 49 | Vaibhav Venugopal Rao, Kyle Juretus and Ioannis Savidis. Practical Performance of Analog Attack Techniques |
| 54 | Tianyou Bao, Pengzhou He and Jiafeng Xie. Systolic Acceleration of Polynomial Multiplication for KEM Saber and Binary Ring-LWE Post-Quantum Cryptography |
| 8 | Asha K A, Abhishek Patyal and Hung-Ming Chen. On Reliability Hardening of FPGA based RO-PUF by using Regression Methodologies |
| 25 | Niels van Drueten, Konstantina Miteloudi and Ileana Buhan. Plan your defense: The impact of leakage detection methods for hardware modules |
| 31 | Duhyun Jeon, Dongmin Lee, Dong Kyue Kim and Byong-Deok Choi. Contact PUF: Highly Stable Physical Unclonable Functions Based on Contact Failure Probability in 180 nm, 130 nm, and 28 nm CMOS Processes |
| 61 | Shawn Blanton, Danielle Duvalsaint and Ruben Purdy. Secuirty Metrics for Logic Circuits |