Search dblp for Publications

export results for "toc:db/conf/host/host2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/host/Abramovic08,
  author       = {Miron Abramovic},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {A Solution for On-Line {TRUST} Validation},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {100--100},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559058},
  doi          = {10.1109/HST.2008.4559058},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/Abramovic08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/AlkabaniK08,
  author       = {Yousra Alkabani and
                  Farinaz Koushanfar},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Designer's Hardware Trojan Horse},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {82--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559059},
  doi          = {10.1109/HST.2008.4559059},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/AlkabaniK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BangaH08,
  author       = {Mainak Banga and
                  Michael S. Hsiao},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {A Region Based Approach for the Identification of Hardware Trojans},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {40--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559047},
  doi          = {10.1109/HST.2008.4559047},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BangaH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/ChakrabortyPB08,
  author       = {Rajat Subhra Chakraborty and
                  Somnath Paul and
                  Swarup Bhunia},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {On-Demand Transparency for Improving Hardware Trojan Detectability},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {48--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559048},
  doi          = {10.1109/HST.2008.4559048},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/ChakrabortyPB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/ChenS08,
  author       = {Zhimin Chen and
                  Patrick Schaumont},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Slicing Up a Perfect Hardware Masking Scheme},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {21--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559041},
  doi          = {10.1109/HST.2008.4559041},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/ChenS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/Collins08,
  author       = {Dean Collins},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {{TRUST} in Integrated Circuits and 3rd Party {IP}},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {1},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559035},
  doi          = {10.1109/HST.2008.4559035},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/Collins08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/FanV08,
  author       = {Junfeng Fan and
                  Ingrid Verbauwhede},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Unified Digit-Serial Multiplier and Inverter in Finite Field GF(2\({}^{\mbox{m}}\))},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {72--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559055},
  doi          = {10.1109/HST.2008.4559055},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/FanV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/GroszschaedlVP08,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Tobias Vejda and
                  Dan Page},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Reassessing the {TCG} Specifications for Trusted Computing in Mobile
                  and Embedded Systems},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {84--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559060},
  doi          = {10.1109/HST.2008.4559060},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/GroszschaedlVP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/GuilleyCDSHNGV08,
  author       = {Sylvain Guilley and
                  Sumanta Chaudhuri and
                  Jean{-}Luc Danger and
                  Laurent Sauvage and
                  Philippe Hoogvorst and
                  Maxime Nassar and
                  Tarik Graba and
                  Vinh{-}Nga Vong},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Place-and-Route Impact on the Security of {DPL} Designs in FPGAs},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {26--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559042},
  doi          = {10.1109/HST.2008.4559042},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/GuilleyCDSHNGV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/HuangL08,
  author       = {Jiawei Huang and
                  John C. Lach},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {{IC} Activation and User Authentication for Security-Sensitive Systems},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {76--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559056},
  doi          = {10.1109/HST.2008.4559056},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/HuangL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/HuffmireVSKLDI08,
  author       = {Ted Huffmire and
                  Jonathan Valamehr and
                  Timothy Sherwood and
                  Ryan Kastner and
                  Timothy E. Levin and
                  Thuy D. Nguyen and
                  Cynthia E. Irvine},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Trustworthy System Security through 3-D Integrated Hardware},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {91--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559061},
  doi          = {10.1109/HST.2008.4559061},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/HuffmireVSKLDI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/JinM08,
  author       = {Yier Jin and
                  Yiorgos Makris},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Hardware Trojan Detection Using Path Delay Fingerprint},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {51--57},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559049},
  doi          = {10.1109/HST.2008.4559049},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/JinM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/KeanMM08,
  author       = {Tom Kean and
                  David McLaren and
                  Carol Marsh},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Verifying the Authenticity of Chip Designs with the DesignTag System},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {59--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559051},
  doi          = {10.1109/HST.2008.4559051},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/KeanMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/KumarGMST08,
  author       = {Sandeep S. Kumar and
                  Jorge Guajardo and
                  Roel Maes and
                  Geert Jan Schrijen and
                  Pim Tuyls},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {The Butterfly {PUF:} Protecting {IP} on every {FPGA}},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {67--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559053},
  doi          = {10.1109/HST.2008.4559053},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/KumarGMST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/LiL08,
  author       = {Jie Li and
                  John C. Lach},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {At-Speed Delay Characterization for {IC} Authentication and Trojan
                  Horse Detection},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {8--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559038},
  doi          = {10.1109/HST.2008.4559038},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/LiL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MenendezM08,
  author       = {Eric Menendez and
                  Ken Mai},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {A High-Performance, Low-Overhead, Power-Analysis-Resistant, Single-Rail
                  Logic Style},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {33--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559043},
  doi          = {10.1109/HST.2008.4559043},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MenendezM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/RadPT08,
  author       = {Reza M. Rad and
                  Jim Plusquellic and
                  Mohammad Tehranipoor},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Sensitivity Analysis to Hardware Trojans using Power Supply Transient
                  Signals},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {3--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559037},
  doi          = {10.1109/HST.2008.4559037},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/RadPT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/RoyKM08,
  author       = {Jarrod A. Roy and
                  Farinaz Koushanfar and
                  Igor L. Markov},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Circuit {CAD} Tools as a Security Threat},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {65--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559052},
  doi          = {10.1109/HST.2008.4559052},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/RoyKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/Schutz08,
  author       = {Kevin Schutz},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {The Role of Platform Integrity in Trustworthy Systems},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {37--37},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559044},
  doi          = {10.1109/HST.2008.4559044},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/Schutz08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/TaylorYWQ08,
  author       = {Malcolm Taylor and
                  Chi{-}En Daniel Yin and
                  Min Wu and
                  Gang Qu},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {A Hardware-Assisted Data Hiding Based Approach in Building High-Performance
                  Trusted Computing Systems},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {93--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559062},
  doi          = {10.1109/HST.2008.4559062},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/TaylorYWQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/WangTP08,
  author       = {Xiaoxiao Wang and
                  Mohammad Tehranipoor and
                  Jim Plusquellic},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Detecting Malicious Inclusions in Secure Hardware: Challenges and
                  Solutions},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {15--19},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559039},
  doi          = {10.1109/HST.2008.4559039},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/WangTP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/WolffP08,
  author       = {Francis G. Wolff and
                  Christos A. Papachristou},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {An Embedded Flash Memory Vault for Software Trojan Protection},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {97--99},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559063},
  doi          = {10.1109/HST.2008.4559063},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/WolffP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/host/2008,
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4556640/proceeding},
  isbn         = {978-1-4244-2401-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}