default search action
AsianHOST 2020: Kolkata, India
- Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2020, Kolkata, India, December 15-17, 2020. IEEE 2020, ISBN 978-1-7281-8952-9
- Diangarti Bhalang Tariang, Sri Charan Birudaraju, Ruchira Naskar, Vijeta Khare, Rajat Subhra Chakraborty:
Malware Classification Through Attention Residual Network based Visualization. 1-6 - M. Meraj Ahmed, Abhijitt Dhavlle, Naseef Mansoor, Purab Ranjan Sutradhar, Sai Manoj Pudukotai Dinakarrao, Kanad Basu, Amlan Ganguly:
Defense Against on-Chip Trojans Enabling Traffic Analysis Attacks. 1-6 - Ricardo Valles-Novo, Andres Martinez-Sanchez, Wenjie Che:
Boosting Entropy and Enhancing Reliability for Physically Unclonable Functions. 1-6 - Arjit Arora, Kalpit Kothari, Priyanka Joshi, Bodhisatwa Mazumdar:
Revisiting Persistent Fault Analysis: Assessing Weak Keys and Strong Keys in GIFT-64 Lightweight Cipher. 1-6 - Qian Xu, Md Tanvir Arafin, Gang Qu:
MIDAS: Model Inversion Defenses Using an Approximate Memory System. 1-4 - Yunjie Zhang, Yiorgos Makris:
Hardware-Based Detection of Spectre Attacks: A Machine Learning Approach. 1-6 - M. Meraj Ahmed, Abhishek Vashist, Sai Manoj Pudukotai Dinakarrao, Amlan Ganguly:
Architecting a Secure Wireless Interconnect for Multichip Communication: An ML Approach. 1-6 - Qizhi Zhang, Jiaji He, Yiqiang Zhao, Xiaolong Guo:
A Formal Framework for Gate- Level Information Leakage Using Z3. 1-6 - Sujan Kumar Saha, Christophe Bobda:
FPGA Accelerated Embedded System Security Through Hardware Isolation. 1-6 - Hang Liu, Chaofan Zhang, Hongming Fei, Wei Hu, Dawei Guo:
Feedback-based Channel Gain Complement and Cluster-based Quantization for Physical Layer Key Generation. 1-6 - Akshay Gangal, Mengmei Ye, Sheng Wei:
HybridTEE: Secure Mobile DNN Execution Using Hybrid Trusted Execution Environment. 1-6 - Melbin John, Aadil Hoda, Ramanuj Chouksey, Chandan Karfa:
SAT Based Partial Attack on Compound Logic Locking. 1-6 - Jun Kuai, Jiaji He, Haocheng Ma, Yiqiang Zhao, Yumin Hou, Yier Jin:
WaLo: Security Primitive Generator for RT-Level Logic Locking and Watermarking. 1-6 - Huifeng Zhu, Xiaolong Guo, Yier Jin, Xuan Zhang:
PowerScout: A Security-Oriented Power Delivery Network Modeling Framework for Cross-Domain Side-Channel Analysis. 1-6 - Vishal Pal, Srikrishna Acharya, Somesh Shrivastav, Sourav Saha, Ashish Joglekar, Bharadwaj Amrutur:
PUF Based Secure Framework for Hardware and Software Security of Drones. 1-6 - Jeroen Delvaux:
On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis. 1-6 - Yogendra Sao, K. K. Soundra Pandian, Sk Subidh Ali:
Revisiting the security of static masking and compaction: Discovering new vulnerability and Improved Scan Attack on AES. 1-6 - Sudarshan Sharma, Arnab Bag, Debdeep Mukhopadhyay:
Compact and Secure Generic Discrete Gaussian Sampler based on HW/SW Co-design. 1-6 - Yuan Liu, Pingqiang Zhou:
Defending Against Adversarial Attacks in Deep Learning with Robust Auxiliary Classifiers Utilizing Bit Plane Slicing. 1-4 - Yaodan Hu, Haoqi Shan, Raj Gautam Dutta, Yier Jin:
Protecting Platoons from Stealthy Jamming Attack. 1-6 - Oualid Trabelsi, Laurent Sauvage, Jean-Luc Danger:
Characterization of Electromagnetic Fault Injection on a 32-bit Microcontroller Instruction Buffer. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.