default search action
Journal of Hardware and Systems Security, Volume 1
Volume 1, Number 1, March 2017
- Swarup Bhunia, Mark M. Tehranipoor:
Editorial for the Introductory Issue of the Journal of Hardware and Systems Security (HaSS). 1-2 - Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay:
Fault Tolerant Infective Countermeasure for AES. 3-17 - Yunxi Guo, Akhilesh Tyagi:
Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication. 18-37 - Brent Sherman, Mike Borza, Brian Rosenberg, Charles Qi:
Security Assurance Guidance for Third-Party IP. 38-55 - Nandeesha Veeranna, Benjamin Carrión Schäfer:
Trust Filter: Runtime Hardware Trojan Detection in Behavioral MPSoCs. 56-67 - Yuanwen Huang, Prabhat Mishra:
Trace Buffer Attack on the AES Cipher. 68-84 - Bicky Shakya, Miao Tony He, Hassan Salmani, Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor:
Benchmarking of Hardware Trojans and Maliciously Affected Circuits. 85-102
Volume 1, Number 2, June 2017
- Nandeesha Veeranna, Benjamin Carrión Schäfer:
S3CBench: Synthesizable Security SystemC Benchmarks for High-Level Synthesis. 103-113 - Juan Lopez, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
A Survey on Function and System Call Hooking Approaches. 114-136 - Md. Tauhidur Rahman, Alison Hosey, Zimu Guo, Jackson Carroll, Domenic Forte, Mark M. Tehranipoor:
Systematic Correlation and Cell Neighborhood Analysis of SRAM PUF for Robust and Unique Key Generation. 137-155 - Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Differential Fault Analysis of SHA-3 Under Relaxed Fault Models. 156-172 - Rajesh Jayashankara Shridevi, Dean Michael Ancajas, Koushik Chakraborty, Sanghamitra Roy:
Security Measures Against a Rogue Network-on-Chip. 173-187 - Anthony Bahadir Lopez, Korosh Vatanparvar, Atul Prasad Deb Nath, Shuo Yang, Swarup Bhunia, Mohammad Abdullah Al Faruque:
A Security Perspective on Battery Systems of the Internet of Things. 188-199
Volume 1, Number 3, September 2017
- Debdeep Mukhopadhyay, Vishal Saraswat:
Editorial for the Special Issue in Journal of Hardware and Systems Security (HaSS) Based on Selected Papers from 6th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2016). 201-202 - Rajat Sadhukhan, Sikhar Patranabis, Ashrujit Ghoshal, Debdeep Mukhopadhyay, Vishal Saraswat, Santosh Ghosh:
An Evaluation of Lightweight Block Ciphers for Resource-Constrained Applications: Area, Performance, and Security. 203-218 - Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout:
A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs. 219-236 - Jakub Breier, Wei He, Shivam Bhasin, Dirmanto Jap, Samuel Chef, Hock Guan Ong, Chee Lip Gan:
Extensive Laser Fault Injection Profiling of 65 nm FPGA. 237-251 - Debapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S. V. Dilip Kumar, Debdeep Mukhopadhyay, Mridul Nandi:
Two Efficient Fault-Based Attacks on CLOC and SILC. 252-268 - Guido Bertoni, Marco Martinoli, Maria Chiara Molteni:
A Methodology for the Characterisation of Leakages in Combinatorial Logic. 269-281 - Dhiman Saha, Sourya Kakarla, Srinath Mandava, Dipanwita Roy Chowdhury:
Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ. 282-296
Volume 1, Number 4, December 2017
- Sandip Ray, Yier Jin:
Guest Editorial: Security Challenges in the IoT Regime. 297 - Jakub Breier, Wei He, Dirmanto Jap, Shivam Bhasin, Anupam Chattopadhyay:
Attacks in Reality: the Limits of Concurrent Error Detection Codes Against Laser Fault Injection. 298-310 - Mahabubul Alam, Mark M. Tehranipoor, Ujjwal Guin:
TSensors Vision, Infrastructure and Security Challenges in Trillion Sensor Era. 311-327 - Asmit De, Mohammad Nasim Imtiaz Khan, Jongsun Park, Swaroop Ghosh:
Replacing eFlash with STTRAM in IoTs: Security Challenges and Solutions. 328-339 - Arvind Singh, Monodeep Kar, Sanu Mathew, Anand Rajan, Vivek De, Saibal Mukhopadhyay:
Reducing Side-Channel Leakage of Encryption Engines Using Integrated Low-Dropout Voltage Regulators. 340-355 - Brien Croteau, Deepak Krishnankutty, Kiriakos Kiriakidis, Tracie Severson, Chintan Patel, Ryan W. Robucci, Erick J. Rodríguez-Seda, Nilanjan Banerjee:
Cross-Level Detection Framework for Attacks on Cyber-Physical Systems. 356-369
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.