Stop the war!
Остановите войну!
for scientists:
default search action
Journal of Hardware and Systems Security, Volume 3
Volume 3, Number 1, March 2019
- Sk Subidh Ali, Debdeep Mukhopadhyay:
Guest Editorial SPACE 2017 Special Issue in the Journal of Hardware and Systems Security (HaSS). 1-2 - Donghoon Chang, Mohona Ghosh, Arpan Jati, Abhishek Kumar, Somitra Kumar Sanadhya:
A Generalized Format Preserving Encryption Framework Using MDS Matrices. 3-11 - Vishal Saraswat, Rajeev Anand Sahu, Gaurav Sharma, Veronika Kuchta, Olivier Markowitch:
Public-Key Encryption with Integrated Keyword Search. 12-25 - Manaar Alam, Sarani Bhattacharya, Sayan Sinha, Chester Rebeiro, Debdeep Mukhopadhyay:
IPA: an Instruction Profiling-Based Micro-architectural Side-Channel Attack on Block Ciphers. 26-44 - Efthimios Alepis, Constantinos Patsakis:
Unravelling Security Issues of Runtime Permissions in Android. 45-63 - Akhilesh Anilkumar Siddhanti, Subhamoy Maitra, Nishant Sinha:
Certain Observations on ACORN v3 and Grain v1 - Implications Towards TMDTO Attacks. 64-77 - Vincent Immler, Matthias Hiller, Qinzhi Liu, Andreas Lenz, Antonia Wachter-Zeh:
Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs - Extended Version. 78-93 - Bhagwan N. Bathe, Bharti Hariramani, A. K. Bhattacharjee, S. V. Kulgod:
Analysis of Diagonal Constants for Extension of Salsa to 64 Bit. 94-102
Volume 3, Number 2, June 2019
- Sikhar Patranabis, Debapriya Basu Roy, Anirban Chakraborty, Naveen Nagar, Astikey Singh, Debdeep Mukhopadhyay, Santosh Ghosh:
Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications. 103-131 - Charalambos Konstantinou, Michail Maniatakos:
Hardware-Layer Intelligence Collection for Smart Grid Embedded Systems. 132-146 - Himanshi Jain, D. Anthony Balaraju, Chester Rebeiro:
Spy Cartel: Parallelizing Evict+Time-Based Cache Attacks on Last-Level Caches. 147-163 - Hossein Abbasi, Naser Ezzati-Jivan, Martine Bellaïche, Chamseddine Talhi, Michel R. Dagenais:
Machine Learning-Based EDoS Attack Detection Technique Using Execution Trace Analysis. 164-176 - Rajesh J. S., Chidhambaranathan Rajamanikkam, Koushik Chakraborty, Sanghamitra Roy:
Securing Data Center Against Power Attacks. 177-188 - Jason R. Hamlet, Jackson R. Mayo, Vivian Kammler:
Targeted modification of hardware trojans. 189-197
Volume 3, Number 3, September 2019
- Michael Vai, Yunsi Fei, Roger Khazan:
Guest Editorial: Special Issue on Hardware Solutions for Cyber Security. 199 - Lake Bu, Jaya Dofe, Qiaoyan Yu, Michel A. Kinsy:
SRASA: a Generalized Theoretical Framework for Security and Reliability Analysis in Computing Systems. 200-218 - Jakub Szefer:
Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses. 219-234 - Leandro Santiago de Araújo, Vinay C. Patil, Charles B. Prado, Tiago A. O. Alves, Leandro A. J. Marzulo, Felipe M. G. França, Sandip Kundu:
Design of Robust, High-Entropy Strong PUFs via Weightless Neural Network. 235-249
- Pallabi Ghosh, Aritra Bhattacharya, Domenic Forte, Rajat Subhra Chakraborty:
Automated Defective Pin Detection for Recycled Microelectronics Identification. 250-260 - James Chacko, Kyle Juretus, Marko Jacovic, Cem Sahin, Nagarajan Kandasamy, Ioannis Savidis, Kapil R. Dandekar:
Securing Wireless Communication via Hardware-Based Packet Obfuscation. 261-272 - Mosabbah Mushir Ahmed, David Hély, Etienne Perret, Nicolas Barbot, Romain Siragusa, Maxime Bernier, Frédéric Garet:
Robust and Noninvasive IC Authentication Using Radiated Electromagnetic Emissions. 273-288 - Constantinos Patsakis, Kleanthis Dellios, José María de Fuentes, Fran Casino, Agusti Solanas:
External Monitoring Changes in Vehicle Hardware Profiles: Enhancing Automotive Cyber-Security. 289-303
Volume 3, Number 4, December 2019
- Haider Adnan Khan, Nader Sehatbakhsh, Luong N. Nguyen, Milos Prvulovic, Alenka G. Zajic:
Malware Detection in Embedded Systems Using Neural Network Model for Electromagnetic Side-Channel Signals. 305-318 - Prathap Siddavaatam, Reza Sedaghat:
A New Adaptive Security Architecture with Extensible Computation Complexity for Generic Ciphers. 319-337 - Pinchen Cui, Ujjwal Guin, Anthony Skjellum, David A. Umphress:
Blockchain in IoT: Current Trends, Challenges, and Future Roadmap. 338-364 - Abderrahmane Sensaoui, Oum-El-Kheir Aktouf, David Hély, Stephane Di Vito:
An In-depth Study of MPU-Based Isolation Techniques. 365-381 - Ioannis Karageorgos, Mehmet Meric Isgenc, Samuel Pagliarini, Lawrence T. Pileggi:
Chip-to-Chip Authentication Method Based on SRAM PUF and Public Key Cryptography. 382-396 - Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Analysis of Secure Caches Using a Three-Step Model for Timing-Based Attacks. 397-425 - James Shey, Naghmeh Karimi, Ryan W. Robucci, Chintan Patel:
Implementation-Based Design Fingerprinting for Robust IC Fraud Detection. 426-439
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.