default search action
3rd IVSW 2018: Costa Brava, Spain
- 3rd IEEE International Verification and Security Workshop, IVSW 2018, Costa Brava, Spain, July 2-4, 2018. IEEE 2018, ISBN 978-1-5386-6544-2
- Rolf Drechsler:
Keynotes: Towards Self-Explaining Digital Systems: A Design Methodology for the Next Generation. i-iii - Rolf Drechsler, Christoph Lüth, Görschwin Fey, Tim Güneysu:
Towards Self-Explaining Digital Systems: A Design Methodology for the Next Generation. 1-6 - Adrien Facon, Sylvain Guilley, Matthieu Lec'Hvien, Alexander Schaub, Youssef Souissi:
Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms. 7-12 - Michael Werner, Bernhard Lippmann, Johanna Baehr, Helmut Gräb:
Reverse Engineering of Cryptographic Cores by Structural Interpretation Through Graph Analysis. 13-18 - Alessandro Barenghi, Luca Breveglieri, Niccolò Izzo, Gerardo Pelosi:
Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks. 19-24 - Mosabbah Mushir Ahmed, David Hély, Etienne Perret, Nicolas Barbot, Romain Siragusa, Maxime Bernier, Frédéric Garet:
Authentication of Microcontroller Board Using Non-Invasive EM Emission Technique. 25-30 - Andrea Marcelli, Ernesto Sánchez, Luca Sasselli, Giovanni Squillero:
On the Mitigation of Hardware Trojan Attacks in Embedded Processors by Exploiting a Hardware-Based Obfuscator. 31-37 - Yildiran Yilmaz, Steve R. Gunn, Basel Halak:
Lightweight PUF-Based Authentication Protocol for IoT Devices. 38-43 - Amira Elhamshary, Yehea Ismail, Said Elkhamy:
Security Analysis of Chaotic Baker Maps. 44-47 - Shakil Mahmud, Brooks Olney, Robert Karam:
Architectural Diversity: Bio-Inspired Hardware Security for FPGAs. 48-51 - Haibo Su, Mark Zwolinski, Basel Halak:
A Machine Learning Attacks Resistant Two Stage Physical Unclonable Functions Design. 52-55 - Thao Le, Lucas Weaver, Jia Di, Shaojie Zhang, Yier Jin:
Hardware Trojan Detection and Functionality Determination for Soft IPs. 56-61 - Maoyuan Qin, Wei Hu, Dejun Mu, Yu Tai:
Property Based Formal Security Verification for Hardware Trojan Detection. 62-67 - Mathieu Da Silva, Emanuele Valea, Marie-Lise Flottes, Sophie Dupuis, Giorgio Di Natale, Bruno Rouzeyre:
A New Secure Stream Cipher for Scan Chain Encryption. 68-73 - Sofiane Takarabt, Kais Chibani, Adrien Facon, Sylvain Guilley, Yves Mathieu, Laurent Sauvage, Youssef Souissi:
Pre-silicon Embedded System Evaluation as New EDA Tool for Security Verification. 74-79 - Adam Hastings, Sean Jensen, Jeffrey Goeders, Brad L. Hutchings:
Using Physical and Functional Comparisons to Assure 3rd-Party IP for Modern FPGAs. 80-86 - Zahra Kazemi, Athanasios Papadimitriou, David Hély, Mahdi Fazeli, Vincent Beroulle:
Hardware Security Evaluation Platform for MCU-Based Connected Devices: Application to Healthcare IoT. 87-92 - M. Tanjidur Rahman, Qihang Shi, Shahin Tajik, Hao-Ting Shen, Damon L. Woodard, Mark M. Tehranipoor, Navid Asadizanjani:
Physical Inspection & Attacks: New Frontier in Hardware Security. 93-102
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.