


default search action
AsianHOST 2020: Kolkata, India
- Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2020, Kolkata, India, December 15-17, 2020. IEEE 2020, ISBN 978-1-7281-8952-9

- Diangarti Bhalang Tariang

, Sri Charan Birudaraju, Ruchira Naskar
, Vijeta Khare, Rajat Subhra Chakraborty:
Malware Classification Through Attention Residual Network based Visualization. 1-6 - M. Meraj Ahmed, Abhijitt Dhavlle, Naseef Mansoor, Purab Ranjan Sutradhar, Sai Manoj Pudukotai Dinakarrao, Kanad Basu, Amlan Ganguly:

Defense Against on-Chip Trojans Enabling Traffic Analysis Attacks. 1-6 - Ricardo Valles-Novo, Andres Martinez-Sanchez, Wenjie Che

:
Boosting Entropy and Enhancing Reliability for Physically Unclonable Functions. 1-6 - Arjit Arora

, Kalpit Kothari, Priyanka Joshi
, Bodhisatwa Mazumdar:
Revisiting Persistent Fault Analysis: Assessing Weak Keys and Strong Keys in GIFT-64 Lightweight Cipher. 1-6 - Qian Xu, Md Tanvir Arafin

, Gang Qu:
MIDAS: Model Inversion Defenses Using an Approximate Memory System. 1-4 - Yunjie Zhang, Yiorgos Makris:

Hardware-Based Detection of Spectre Attacks: A Machine Learning Approach. 1-6 - M. Meraj Ahmed, Abhishek Vashist, Sai Manoj Pudukotai Dinakarrao, Amlan Ganguly:

Architecting a Secure Wireless Interconnect for Multichip Communication: An ML Approach. 1-6 - Qizhi Zhang, Jiaji He, Yiqiang Zhao, Xiaolong Guo:

A Formal Framework for Gate- Level Information Leakage Using Z3. 1-6 - Sujan Kumar Saha, Christophe Bobda:

FPGA Accelerated Embedded System Security Through Hardware Isolation. 1-6 - Hang Liu, Chaofan Zhang, Hongming Fei, Wei Hu, Dawei Guo:

Feedback-based Channel Gain Complement and Cluster-based Quantization for Physical Layer Key Generation. 1-6 - Akshay Gangal, Mengmei Ye, Sheng Wei:

HybridTEE: Secure Mobile DNN Execution Using Hybrid Trusted Execution Environment. 1-6 - Melbin John, Aadil Hoda, Ramanuj Chouksey, Chandan Karfa:

SAT Based Partial Attack on Compound Logic Locking. 1-6 - Jun Kuai

, Jiaji He, Haocheng Ma, Yiqiang Zhao, Yumin Hou, Yier Jin
:
WaLo: Security Primitive Generator for RT-Level Logic Locking and Watermarking. 1-6 - Huifeng Zhu, Xiaolong Guo, Yier Jin

, Xuan Zhang:
PowerScout: A Security-Oriented Power Delivery Network Modeling Framework for Cross-Domain Side-Channel Analysis. 1-6 - Vishal Pal, Srikrishna Acharya, Somesh Shrivastav, Sourav Saha, Ashish Joglekar, Bharadwaj Amrutur:

PUF Based Secure Framework for Hardware and Software Security of Drones. 1-6 - Jeroen Delvaux

:
On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis. 1-6 - Yogendra Sao, K. K. Soundra Pandian, Sk Subidh Ali

:
Revisiting the security of static masking and compaction: Discovering new vulnerability and Improved Scan Attack on AES. 1-6 - Sudarshan Sharma, Arnab Bag, Debdeep Mukhopadhyay:

Compact and Secure Generic Discrete Gaussian Sampler based on HW/SW Co-design. 1-6 - Yuan Liu, Pingqiang Zhou:

Defending Against Adversarial Attacks in Deep Learning with Robust Auxiliary Classifiers Utilizing Bit Plane Slicing. 1-4 - Yaodan Hu, Haoqi Shan, Raj Gautam Dutta, Yier Jin

:
Protecting Platoons from Stealthy Jamming Attack. 1-6 - Oualid Trabelsi, Laurent Sauvage, Jean-Luc Danger:

Characterization of Electromagnetic Fault Injection on a 32-bit Microcontroller Instruction Buffer. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














