


default search action
HOST 2014: Arlington, VA, USA
- 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-4114-8

Session Split Fabrication
- Kaushik Vaidyanathan, Bishnu Prasad Das, Huseyin Ekin Sumbul, Renzhi Liu, Larry T. Pileggi

:
Building trusted ICs using split fabrication. 1-6 - Meenatchi Jagasivamani, Peter Gadfort

, Michel Sika, Michael Bajura, Michael Fritze:
Split-fabrication obfuscation: Metrics and techniques. 7-12 - Kaushik Vaidyanathan, Renzhi Liu, Huseyin Ekin Sumbul, Qiuling Zhu, Franz Franchetti, Larry T. Pileggi

:
Efficient and secure intellectual property (IP) design with split fabrication. 13-18
Session Hardware Trust & Characterization
- Franco Stellari

, Peilin Song, Alan J. Weger, Jim Culp, A. Herbert, Dirk Pfeiffer:
Verification of untrusted chips using trusted layout and emission measurements. 19-24 - Jean-Michel Cioranesco, Jean-Luc Danger, Tarik Graba, Sylvain Guilley, Yves Mathieu, David Naccache, Xuan Thuy Ngo:

Cryptographically secure shields. 25-31 - Daisuke Fujimoto, Daichi Tanaka, Noriyuki Miura, Makoto Nagata

, Yu-ichi Hayashi, Naofumi Homma, Shivam Bhasin, Jean-Luc Danger:
Side-channel leakage on silicon substrate of CMOS cryptographic chip. 32-37
Session PUFSI
- Raghavan Kumar, Wayne P. Burleson:

On design of a highly secure PUF based on non-linear current mirrors. 38-43 - Patrick Koeberl, Jiangtao Li, Anand Rajan, Wei Wu:

Entropy loss in PUF-based key generation schemes: The repetition code pitfall. 44-49 - Durga Prasad Sahoo, Sayandeep Saha, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Hitesh Kapoor:

Composite PUF: A new design paradigm for Physically Unclonable Functions on FPGA. 50-55
Session Poster Session
- Shivam Bhasin, Tarik Graba, Jean-Luc Danger, Zakaria Najm:

A look into SIMON from a side-channel perspective. 56-59 - Franck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, Assia Tria:

Increasing the efficiency of laser fault injections using fast gate level reverse engineering. 60-63 - Dylan Ismari, Jim Plusquellic:

IP-level implementation of a resistance-based physical unclonable function. 64-69 - Sava Krstic, Jin Yang, David W. Palmer, Randy B. Osborne, Eran Talmor:

Security of SoC firmware load protocols. 70-75 - Kotaro Okamoto, Naofumi Homma, Takafumi Aoki, Sumio Morioka

:
A hierarchical formal approach to verifying side-channel resistant cryptographic processors. 76-79 - Stjepan Picek, Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Domagoj Jakobovic

:
Optimality and beyond: The case of 4×4 S-boxes. 80-83 - Oliver Soll, Thomas Korak, Michael Muehlberghuber, Michael Hutter:

EM-based detection of hardware trojans on FPGAs. 84-87 - Merrielle Spain, Benjamin Fuller

, Kyle Ingols, Robert K. Cunningham:
Robust keys from physical unclonable functions. 88-92 - Mostafa M. I. Taha, Patrick Schaumont

:
Side-channel countermeasure for SHA-3 at almost-zero area overhead. 93-96 - Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine:

A frequency leakage model for SCA. 97-100 - Kan Xiao, Md. Tauhidur Rahman

, Domenic Forte
, Yu Huang, Mei Su, Mohammad Tehranipoor:
Bit selection algorithm suitable for high-volume production of SRAM-PUF. 101-106 - Norimasa Yoshimizu:

Hardware trojan detection by symmetry breaking in path delays. 107-111
Session Countermeasures
- Nicolas Moro

, Karine Heydemann, Amine Dehbaoui, Bruno Robisson
, Emmanuelle Encrenaz:
Experimental evaluation of two software countermeasures against fault attacks. 112-117 - Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri

:
NREPO: Normal basis Recomputing with Permuted Operands. 118-123 - Meng-Day (Mandel) Yu, David M'Raïhi, Ingrid Verbauwhede

, Srinivas Devadas:
A noise bifurcation architecture for linear additive physical functions. 124-129
Session Security Attacks
- Loïc Zussa, Jean-Max Dutertre

, Jessy Clédière
, Bruno Robisson
:
Analysis of the fault injection mechanism related to negative and positive power supply glitches using an on-chip voltmeter. 130-135 - Kamil Gomina, Jean-Baptiste Rigaud

, Philippe Gendrier, Philippe Candelier, Assia Tria:
Power supply glitch attacks: Design and evaluation of detection circuits. 136-141 - Sk Subidh Ali

, Ozgur Sinanoglu
, Samah Mohamed Saeed, Ramesh Karri
:
New scan attacks against state-of-the-art countermeasures and DFT. 142-147
Session PUFS II
- Roel Maes

, Vincent van der Leest:
Countering the effects of silicon aging on SRAM PUFs. 148-153 - Anirudh Iyengar, Kenneth Ramclam, Swaroop Ghosh:

DWM-PUF: A low-overhead, memory-based security primitive. 154-159 - Siva Nishok Dhanuskodi, Arunkumar Vijayakumar, Sandip Kundu:

A Chaotic Ring oscillator based Random Number Generator. 160-165

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














