default search action
AsianHOST 2017: Beijing, China
- 2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017, Beijing, China, October 19-20, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-1421-1
- Xiaoxiao Wang, Yueyu Guo, Tauhid Ramhan, Dongrong Zhang, Mark M. Tehranipoor:
DOST: Dynamically obfuscated wrapper for split test against IC piracy. 1-6 - Mengmei Ye, Mehrdad Zaker Shahrak, Sheng Wei:
PUFSec: Protecting physical unclonable functions using hardware isolation-based system security techniques. 7-12 - Wei-Che Wang, Yair Yona, Yizhang Wu, Szu-Yao Hung, Suhas N. Diggavi, Puneet Gupta:
Implementation of stable PUFs using gate oxide breakdown. 13-18 - Shuang Wang, Yang Li, Jian Wang:
A new key rank estimation method to investigate dependent key lists of side channel attacks. 19-24 - Zimu Guo, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
MPA: Model-assisted PCB attestation via board-level RO and temperature compensation. 25-30 - Zhonghao Liao, George T. Amariucai, Raymond K. W. Wong, Yong Guan:
The impact of discharge inversion effect on learning SRAM power-up statistics. 31-36 - Yuan Cao, Chip-Hong Chang, Yue Zheng, Xiaojin Zhao:
An energy-efficient true random number generator based on current starved ring oscillators. 37-42 - Jing Ye, Yue Gong, Yu Hu, Xiaowei Li:
Polymorphic PUF: Exploiting reconfigurability of CPU+FPGA SoC to resist modeling attack. 43-48 - Fan Zhang, Liang Geng, Jizhong Shen, Shivam Bhasin, Xinjie Zhao, Shize Guo:
Improved low-entropy masking scheme for LED with mitigation against correlation-enhanced collision attacks. 49-54 - Tian Wang, Xiaoxin Cui, Yewen Ni, Dunshan Yu, Xiaole Cui, Gang Qu:
A practical cold boot attack on RSA private keys. 55-60 - Kun Yang, Ulbert Botero, Hao-Ting Shen, Domenic Forte, Mark M. Tehranipoor:
A split manufacturing approach for unclonable chipless RFIDs for pharmaceutical supply chain security. 61-66 - Rui Liu, Huaqiang Wu, Yachun Pang, He Qian, Shimeng Yu:
Extending 1kb RRAM array from weak PUF to strong PUF by employment of SHA module. 67-72 - Robert Karam, Tamzidul Hoque, Kevin R. B. Butler, Swarup Bhunia:
Mixed-granular architectural diversity for device security in the Internet of Things. 73-78 - Xiaolong Guo, Raj Gautam Dutta, Jiaji He, Yier Jin:
PCH framework for IP runtime security verification. 79-84 - Sharareh Zamanzadeh, Ali Jahanian:
Scalable security path methodology: A cost-security trade-off to protect FPGA IPs against active and passive tampers. 85-90 - Bohan Yang, Vladimir Rozic, Milos Grujic, Nele Mentens, Ingrid Verbauwhede:
On-chip jitter measurement for true random number generators. 91-96 - Ali Shuja Siddiqui, Chia-Che Lee, Wenjie Che, Jim Plusquellic, Fareena Saqib:
Secure intra-vehicular communication over CANFD. 97-102 - Festus Hategekimana, Taylor J. L. Whitaker, Md Jubaer Hossain Pantho, Christophe Bobda:
Secure integration of non-trusted IPs in SoCs. 103-108 - Chinmay Deshpande, Bilgiday Yuce, Leyla Nazhandali, Patrick Schaumont:
Employing dual-complementary flip-flops to detect EMFI attacks. 109-114 - Nektarios Georgios Tsoutsos, Michail Maniatakos:
Obfuscating branch decisions based on encrypted data using MISR and hash digests. 115-120 - Patrick Cronin, Chengmo Yang, Dongqin Zhou, Keni Qiu, Xin Shi, Yongpan Liu:
'The danger of sleeping', an exploration of security in non-volatile processors. 121-126 - Xiaojun Zhou, Jiafeng Xie:
Evaluating obfuscation performance of novel algorithm-to-architecture mapping techniques in systolic-array-based circuits. 127-132
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.