


default search action
AsianHOST 2022: Shanghai, China
- Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2022, Singapore, Singapore, December 14-16, 2022. IEEE 2022, ISBN 978-1-6654-6114-6
- Kartik Nayak, Devanshi Upadhyaya, Francesco Regazzoni
, Ilia Polian:
On the Limitations of Logic Locking the Approximate Circuits. 1-6 - Juncheng Chen
, Jun-Sheng Ng, Nay Aung Kyaw, Zhili Zou, Kwen-Siong Chong, Zhiping Lin, Bah-Hwee Gwee:
Incremental Linear Regression Attack. 1-4 - Haocheng Ma, Shijian Pan, Ya Gao, Jiaji He, Yiqiang Zhao, Yier Jin:
Vulnerable PQC against Side Channel Analysis - A Case Study on Kyber. 1-6 - Mahmudul Hasan, Tamzidul Hoque:
KEATON: Assertion-guided Attack on Combinational and Sequential Locking without Scan Access. 1-6 - Minyan Gao, Domenic Forte
:
iPROBE-O: FIB-aware Place and Route for Probing Protection Using Orthogonal Shields. 1-6 - Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino:
Fundamental Study of Adversarial Examples Created by Fault Injection Attack on Image Sensor Interface. 1-6 - Tianming Ni, Qingsong Peng, Jingchang Bian, Liang Yao, Zhengfeng Huang, Aibin Yan, Xiaoqing Wen:
MRCO: A Multi-ring Convergence Oscillator-based High-Efficiency True Random Number Generator. 1-6 - Farhaan Fowze, Muhtadi Choudhury, Domenic Forte
:
EISec: Exhaustive Information Flow Security of Hardware Intellectual Property Utilizing Symbolic Execution. 1-6 - Chutitep Woralert
, Chen Liu
, Zander Blasingame:
HARD-Lite: A Lightweight Hardware Anomaly Realtime Detection Framework Targeting Ransomware. 1-6 - Shuo Yang, Dongsheng Liu, Ang Hu, Aobo Li, Jiaming Zhang
, Xiang Li, Jiahao Lu, Changwen Mo:
An Instruction-configurable Post-quantum Cryptographic Processor towards NTRU. 1-6 - Rajat Sadhukhan, Anirban Chakraborty, Debdeep Mukhopadhyay:
FUNDAE: Fault Template Attack on SUNDAE-GIFT AEAD Scheme. 1-6 - Jiaming Wu, Farhaan Fowze, Domenic Forte
:
EXERT: EXhaustive IntEgRiTy Analysis for Information Flow Security. 1-6 - Federico Larroca, Pablo Bertrand, Felipe Carrau, Victoria Severi:
gr-tempest: an open-source GNU Radio implementation of TEMPEST. 1-6 - Liang Yao, Huaguo Liang, Hong Zhang, Tianming Ni, Maoxiang Yi, Yingchun Lu:
A Lightweight M_TRNG Design based on MUX Cell Entropy using Multiphase Sampling. 1-4 - Jonathan Cruz, Pravin Gaikwad, Abhishek Anil Nair, Prabuddha Chakraborty, Swarup Bhunia
:
A Machine Learning Based Automatic Hardware Trojan Attack Space Exploration and Benchmarking Framework. 1-6 - Pengfei Qiu, Qiang Gao, Dongsheng Wang, Yongqiang Lyu, Chang Liu, Xiaoyong Li, Chunlu Wang, Gang Qu:
PMU-Spill: Performance Monitor Unit Counters Leak Secrets in Transient Executions. 1-6 - Jonathan Cruz, Pravin Gaikwad, Swarup Bhunia
:
Analysis of Hardware Trojan Resilience Enabled through Logic Locking. 1-6 - Dipnarayan Das, Sourav Roy
, Mahabub Hasan Mahalat, Bibhash Sen:
A Novel Cross-Platform Physically Unclonable Function for Emerging FPGA-based IoT Devices. 1-4 - Lele Fang, Jiahao Liu, Yan Zhu, Chi-Hang Chan, Rui Paulo Martins:
LSB-Reused Protection Technique in Secure SAR ADC against Power Side-Channel Attack. 1-6 - Hui Li, Gang Li, Pengjun Wang, Xilong Shao:
A Novel Machine Learning Attack Resistant APUF with Dual-Edge Acquisition. 1-4 - James Geist, Shaojie Zhang, Yier Jin, Travis Meade:
A Structural and SAT Analysis of SANSCrypt. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.