


default search action
HOST 2009: San Francisco, CA, USA
- Mohammad Tehranipoor, Jim Plusquellic:
IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2009, San Francisco, CA, USA, July 27, 2009. Proceedings. IEEE Computer Society 2009, ISBN 978-1-4244-4805-0
Session 1: Attacks
- Sergei P. Skorobogatov:
Local Heating Attacks on Flash Memory Devices. 1-6 - Guilhem Castagnos, Alexandre Berzati, Cécile Canovas
, Blandine Debraize, Louis Goubin, Aline Gouget, Pascal Paillier, Stephanie Salgado:
Fault Analysis of Grain-128. 7-14 - Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Nidhal Selmane:
Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs. 15-21
Session 2: Physical Unclonable Functions
- Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schellekens, Boris Skoric, Pim Tuyls:
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage. 22-29 - Vignesh Vivekraja, Leyla Nazhandali:
Circuit Level Techniques for Reliable Physically Uncloneable Functions. 30-35 - Gang Qu:
Temperature-Aware Cooperative Ring Oscillator PUF. 36-42
Session 4: Hardware Trojans
- Andrea Candore, Övünç Kocabas, Farinaz Koushanfar
:
Robust Stable Radiometric Fingerprinting for Frequency Reconfigurable Devices. 43-49 - Yier Jin
, Nathan Kupp, Yiorgos Makris
:
Experiences in Hardware Trojan Design and Implementation. 50-57 - Devendra Rai, John C. Lach:
Performance of Delay-Based Trojan Detection Techniques under Parameter Variations. 58-65 - Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic:
New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time. 66-73
Session 5: IP Protection and CAD Tools for Security
- Roel Maes
, Dries Schellekens, Pim Tuyls, Ingrid Verbauwhede
:
Analysis and Design of Active IC Metering Schemes. 74-81 - Jorge Guajardo, Tim Güneysu
, Sandeep S. Kumar, Christof Paar:
Secure IP-Block Distribution for Hardware Devices. 82-89 - Zhimin Chen, Patrick Schaumont
:
Extended Abstract: Early Feedback on Side-Channel Risks with Accelerated Toggle-Counting. 90-95
Session 6: Poster Session
- Rajat Subhra Chakraborty, Swarup Bhunia
:
Security Through Obscurity: An Approach for Protecting Register Transfer Level Hardware IP. 96-99 - Gedare Bloom, Bhagirath Narahari, Rahul Simha:
OS Support for Detecting Trojan Circuit Attacks. 100-103 - Mainak Banga, Michael S. Hsiao:
VITAMIN: Voltage Inversion Technique to Ascertain Malicious Insertions in ICs. 104-107 - David R. McIntyre, Francis G. Wolff, Christos A. Papachristou
, Swarup Bhunia
:
Dynamic Evaluation of Hardware Trust. 108-111

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.