default search action
HOST 2008: Anaheim, CA, USA
- Mohammad Tehranipoor, Jim Plusquellic:
IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, Anaheim, CA, USA, June 9, 2008. Proceedings. IEEE Computer Society 2008, ISBN 978-1-4244-2401-6
Keynote address
- Dean Collins:
TRUST in Integrated Circuits and 3rd Party IP. 1
Session 1: Trojan Detection Methods
- Reza M. Rad, Jim Plusquellic, Mohammad Tehranipoor:
Sensitivity Analysis to Hardware Trojans using Power Supply Transient Signals. 3-7 - Jie Li, John C. Lach:
At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection. 8-14 - Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquellic:
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions. 15-19
Session 2: Side-channel Attacks and Countermeasures
- Zhimin Chen, Patrick Schaumont:
Slicing Up a Perfect Hardware Masking Scheme. 21-25 - Sylvain Guilley, Sumanta Chaudhuri, Jean-Luc Danger, Laurent Sauvage, Philippe Hoogvorst, Maxime Nassar, Tarik Graba, Vinh-Nga Vong:
Place-and-Route Impact on the Security of DPL Designs in FPGAs. 26-32 - Eric Menendez, Ken Mai:
A High-Performance, Low-Overhead, Power-Analysis-Resistant, Single-Rail Logic Style. 33-36
Session 3: Invited Presentation
- Kevin Schutz:
The Role of Platform Integrity in Trustworthy Systems. 37-37
Session 4: Hardware Trojans
- Mainak Banga, Michael S. Hsiao:
A Region Based Approach for the Identification of Hardware Trojans. 40-47 - Rajat Subhra Chakraborty, Somnath Paul, Swarup Bhunia:
On-Demand Transparency for Improving Hardware Trojan Detectability. 48-50 - Yier Jin, Yiorgos Makris:
Hardware Trojan Detection Using Path Delay Fingerprint. 51-57
Session 5: IP piracy protection, CAD tool security and PUFs
- Tom Kean, David McLaren, Carol Marsh:
Verifying the Authenticity of Chip Designs with the DesignTag System. 59-64 - Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov:
Circuit CAD Tools as a Security Threat. 65-66 - Sandeep S. Kumar, Jorge Guajardo, Roel Maes, Geert Jan Schrijen, Pim Tuyls:
The Butterfly PUF: Protecting IP on every FPGA. 67-70
Session 6: Cryptography and Securing Hardware
- Junfeng Fan, Ingrid Verbauwhede:
Unified Digit-Serial Multiplier and Inverter in Finite Field GF(2m). 72-75 - Jiawei Huang, John C. Lach:
IC Activation and User Authentication for Security-Sensitive Systems. 76-80
Poster Session
- Miron Abramovic:
A Solution for On-Line TRUST Validation. 100-100 - Yousra Alkabani, Farinaz Koushanfar:
Designer's Hardware Trojan Horse. 82-83 - Johann Großschädl, Tobias Vejda, Dan Page:
Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems. 84-90 - Ted Huffmire, Jonathan Valamehr, Timothy Sherwood, Ryan Kastner, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine:
Trustworthy System Security through 3-D Integrated Hardware. 91-92 - Malcolm Taylor, Chi-En Daniel Yin, Min Wu, Gang Qu:
A Hardware-Assisted Data Hiding Based Approach in Building High-Performance Trusted Computing Systems. 93-96 - Francis G. Wolff, Christos A. Papachristou:
An Embedded Flash Memory Vault for Software Trojan Protection. 97-99
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.