Paper ID |
TITLE |
52 |
Saikat Majumdar, Mohammad Samavatian and Radu Teodorescu. Characterizing Side-Channel Leakage of DNN Classifiers though Performance Counters |
26 |
Mohammad Ebrahimabadi, Suhee Sanjana Mehjabin, Raphael Viera, Sylvain Guilley, Jean-Luc Danger, Jean-Max Dutertre and Naghmeh Karimi. Detecting Laser Fault Injection Attacks via Time-to-Digital Converter Sensors |
62 |
Nafis Irtija, Eirini Eleni Tsiropoulou, Cyrus Minwalla and Jim Plusquellic. True Random Number Generation with the Shift-register Reconvergent-Fanout (SiRF) PUF |
45 |
Jakub Slowik, Gregory Williams, Rummah Albashir, Anthony Samagaio, Fareena Saqib and Geraldine Nicholas. Dynamic Key Updates for LUT Locked Design |
55 |
Shajib Ghosh, Mohammad Tahsin Mostafiz, Suprith Reddy Gurudu, Shayan Taheri and Navid Asadizanjani. PCB Component Detection for Hardware Assurance: A Feature Selection-based Approach |
56 |
Sujan Kumar Saha, Joel Mandebi Mbongue and Christophe Bobda. Metrics for Assessing Security of System-on-Chip |
58 |
Ayaz Akram. Accelerating Address Sanitization for Scientific Applications |
60 |
Md Rafid Muttaki, Tao Zhang, Mark Tehranipoor and Farimah Farahmandi. FTC: A Universal Sensor for Fault Injection Attack Detection |
14 |
Anita Aghaie, Amir Moradi, Johannes Tobisch and Nils Wisiol. Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines |
17 |
Noeloikeau Charlot, Daniel Gauthier, Daniel Canaday and Andrew Pomerance. Mathematical Model of Strong Physically Unclonable Functions Based on Hybrid Boolean Networks |
20 |
Kunbei Cai, Zhenkai Zhang and Fan Yao. On the Feasibility of Training-time Trojan Attacks Through Hardware-based Faults in Memory |
32 |
Reshmi Suragani, Emiliia Nazarenko, Nikolaos Athanasios Anagnostopoulos, Nico Mexis and Elif Bilge Kavun. Identification and Classification of Corrupted PUF Responses via Machine Learning |
40 |
Tolulope Odetola, Adewale Adeyemo and Syed Rafay Hasan. Hardening Hardware Accelerartor Based CNN Inference Phase against Adversarial Noises |
42 |
Amin Rezaei, Ava Hedayatipour, Hossein Sayadi, Mehrdad Aliasgari and Hai Zhou. Global Attack and Remedy on IC-Specific Logic Encryption |
44 |
Yohannes B. Bekele and Daniel B. Limbrick. Evaluating the Impact of Hardware Faults on Program Execution in a Microkernel Environment |
49 |
Vaibhav Venugopal Rao, Kyle Juretus and Ioannis Savidis. Practical Performance of Analog Attack Techniques |
54 |
Tianyou Bao, Pengzhou He and Jiafeng Xie. Systolic Acceleration of Polynomial Multiplication for KEM Saber and Binary Ring-LWE Post-Quantum Cryptography |
8 |
Asha K A, Abhishek Patyal and Hung-Ming Chen. On Reliability Hardening of FPGA based RO-PUF by using Regression Methodologies |
25 |
Niels van Drueten, Konstantina Miteloudi and Ileana Buhan. Plan your defense: The impact of leakage detection methods for hardware modules |
31 |
Duhyun Jeon, Dongmin Lee, Dong Kyue Kim and Byong-Deok Choi. Contact PUF: Highly Stable Physical Unclonable Functions Based on Contact Failure Probability in 180 nm, 130 nm, and 28 nm CMOS Processes |
61 |
Shawn Blanton, Danielle Duvalsaint and Ruben Purdy. Secuirty Metrics for Logic Circuits |