


default search action
3rd IVSW 2018: Costa Brava, Spain
- 3rd IEEE International Verification and Security Workshop, IVSW 2018, Costa Brava, Spain, July 2-4, 2018. IEEE 2018, ISBN 978-1-5386-6544-2
- Rolf Drechsler:
Keynotes: Towards Self-Explaining Digital Systems: A Design Methodology for the Next Generation. i-iii - Rolf Drechsler
, Christoph Lüth, Görschwin Fey
, Tim Güneysu
:
Towards Self-Explaining Digital Systems: A Design Methodology for the Next Generation. 1-6 - Adrien Facon, Sylvain Guilley, Matthieu Lec'Hvien, Alexander Schaub, Youssef Souissi:
Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms. 7-12 - Michael Werner, Bernhard Lippmann, Johanna Baehr
, Helmut Gräb:
Reverse Engineering of Cryptographic Cores by Structural Interpretation Through Graph Analysis. 13-18 - Alessandro Barenghi
, Luca Breveglieri, Niccolò Izzo
, Gerardo Pelosi
:
Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks. 19-24 - Mosabbah Mushir Ahmed, David Hély
, Etienne Perret, Nicolas Barbot, Romain Siragusa, Maxime Bernier, Frédéric Garet:
Authentication of Microcontroller Board Using Non-Invasive EM Emission Technique. 25-30 - Andrea Marcelli, Ernesto Sánchez, Luca Sasselli, Giovanni Squillero:
On the Mitigation of Hardware Trojan Attacks in Embedded Processors by Exploiting a Hardware-Based Obfuscator. 31-37 - Yildiran Yilmaz
, Steve R. Gunn, Basel Halak
:
Lightweight PUF-Based Authentication Protocol for IoT Devices. 38-43 - Amira Elhamshary, Yehea Ismail, Said Elkhamy:
Security Analysis of Chaotic Baker Maps. 44-47 - Shakil Mahmud, Brooks Olney, Robert Karam:
Architectural Diversity: Bio-Inspired Hardware Security for FPGAs. 48-51 - Haibo Su
, Mark Zwolinski
, Basel Halak
:
A Machine Learning Attacks Resistant Two Stage Physical Unclonable Functions Design. 52-55 - Thao Le, Lucas Weaver, Jia Di, Shaojie Zhang, Yier Jin
:
Hardware Trojan Detection and Functionality Determination for Soft IPs. 56-61 - Maoyuan Qin, Wei Hu
, Dejun Mu, Yu Tai:
Property Based Formal Security Verification for Hardware Trojan Detection. 62-67 - Mathieu Da Silva, Emanuele Valea
, Marie-Lise Flottes, Sophie Dupuis, Giorgio Di Natale, Bruno Rouzeyre:
A New Secure Stream Cipher for Scan Chain Encryption. 68-73 - Sofiane Takarabt, Kais Chibani, Adrien Facon, Sylvain Guilley, Yves Mathieu, Laurent Sauvage, Youssef Souissi:
Pre-silicon Embedded System Evaluation as New EDA Tool for Security Verification. 74-79 - Adam Hastings, Sean Jensen, Jeffrey Goeders, Brad L. Hutchings:
Using Physical and Functional Comparisons to Assure 3rd-Party IP for Modern FPGAs. 80-86 - Zahra Kazemi
, Athanasios Papadimitriou
, David Hély
, Mahdi Fazeli, Vincent Beroulle:
Hardware Security Evaluation Platform for MCU-Based Connected Devices: Application to Healthcare IoT. 87-92 - M. Tanjidur Rahman
, Qihang Shi, Shahin Tajik, Hao-Ting Shen, Damon L. Woodard, Mark M. Tehranipoor, Navid Asadizanjani:
Physical Inspection & Attacks: New Frontier in Hardware Security. 93-102

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.