default search action
Search dblp for Publications
export results for "toc:db/conf/host/host2008.bht:"
@inproceedings{DBLP:conf/host/Abramovic08, author = {Miron Abramovic}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {A Solution for On-Line {TRUST} Validation}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {100--100}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559058}, doi = {10.1109/HST.2008.4559058}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/Abramovic08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/AlkabaniK08, author = {Yousra Alkabani and Farinaz Koushanfar}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Designer's Hardware Trojan Horse}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {82--83}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559059}, doi = {10.1109/HST.2008.4559059}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/AlkabaniK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/BangaH08, author = {Mainak Banga and Michael S. Hsiao}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {A Region Based Approach for the Identification of Hardware Trojans}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {40--47}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559047}, doi = {10.1109/HST.2008.4559047}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BangaH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/ChakrabortyPB08, author = {Rajat Subhra Chakraborty and Somnath Paul and Swarup Bhunia}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {On-Demand Transparency for Improving Hardware Trojan Detectability}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {48--50}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559048}, doi = {10.1109/HST.2008.4559048}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/ChakrabortyPB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/ChenS08, author = {Zhimin Chen and Patrick Schaumont}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Slicing Up a Perfect Hardware Masking Scheme}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {21--25}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559041}, doi = {10.1109/HST.2008.4559041}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/ChenS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/Collins08, author = {Dean Collins}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {{TRUST} in Integrated Circuits and 3rd Party {IP}}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {1}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559035}, doi = {10.1109/HST.2008.4559035}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/Collins08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/FanV08, author = {Junfeng Fan and Ingrid Verbauwhede}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Unified Digit-Serial Multiplier and Inverter in Finite Field GF(2\({}^{\mbox{m}}\))}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {72--75}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559055}, doi = {10.1109/HST.2008.4559055}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/FanV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/GroszschaedlVP08, author = {Johann Gro{\ss}sch{\"{a}}dl and Tobias Vejda and Dan Page}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Reassessing the {TCG} Specifications for Trusted Computing in Mobile and Embedded Systems}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {84--90}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559060}, doi = {10.1109/HST.2008.4559060}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/GroszschaedlVP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/GuilleyCDSHNGV08, author = {Sylvain Guilley and Sumanta Chaudhuri and Jean{-}Luc Danger and Laurent Sauvage and Philippe Hoogvorst and Maxime Nassar and Tarik Graba and Vinh{-}Nga Vong}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Place-and-Route Impact on the Security of {DPL} Designs in FPGAs}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {26--32}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559042}, doi = {10.1109/HST.2008.4559042}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/GuilleyCDSHNGV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/HuangL08, author = {Jiawei Huang and John C. Lach}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {{IC} Activation and User Authentication for Security-Sensitive Systems}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {76--80}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559056}, doi = {10.1109/HST.2008.4559056}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/HuangL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/HuffmireVSKLDI08, author = {Ted Huffmire and Jonathan Valamehr and Timothy Sherwood and Ryan Kastner and Timothy E. Levin and Thuy D. Nguyen and Cynthia E. Irvine}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Trustworthy System Security through 3-D Integrated Hardware}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {91--92}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559061}, doi = {10.1109/HST.2008.4559061}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/HuffmireVSKLDI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/JinM08, author = {Yier Jin and Yiorgos Makris}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Hardware Trojan Detection Using Path Delay Fingerprint}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {51--57}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559049}, doi = {10.1109/HST.2008.4559049}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/JinM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/KeanMM08, author = {Tom Kean and David McLaren and Carol Marsh}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Verifying the Authenticity of Chip Designs with the DesignTag System}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {59--64}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559051}, doi = {10.1109/HST.2008.4559051}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/KeanMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/KumarGMST08, author = {Sandeep S. Kumar and Jorge Guajardo and Roel Maes and Geert Jan Schrijen and Pim Tuyls}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {The Butterfly {PUF:} Protecting {IP} on every {FPGA}}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {67--70}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559053}, doi = {10.1109/HST.2008.4559053}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/KumarGMST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/LiL08, author = {Jie Li and John C. Lach}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {At-Speed Delay Characterization for {IC} Authentication and Trojan Horse Detection}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {8--14}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559038}, doi = {10.1109/HST.2008.4559038}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/LiL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/MenendezM08, author = {Eric Menendez and Ken Mai}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {A High-Performance, Low-Overhead, Power-Analysis-Resistant, Single-Rail Logic Style}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {33--36}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559043}, doi = {10.1109/HST.2008.4559043}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/MenendezM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/RadPT08, author = {Reza M. Rad and Jim Plusquellic and Mohammad Tehranipoor}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Sensitivity Analysis to Hardware Trojans using Power Supply Transient Signals}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {3--7}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559037}, doi = {10.1109/HST.2008.4559037}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/RadPT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/RoyKM08, author = {Jarrod A. Roy and Farinaz Koushanfar and Igor L. Markov}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Circuit {CAD} Tools as a Security Threat}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {65--66}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559052}, doi = {10.1109/HST.2008.4559052}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/RoyKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/Schutz08, author = {Kevin Schutz}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {The Role of Platform Integrity in Trustworthy Systems}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {37--37}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559044}, doi = {10.1109/HST.2008.4559044}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/Schutz08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/TaylorYWQ08, author = {Malcolm Taylor and Chi{-}En Daniel Yin and Min Wu and Gang Qu}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {A Hardware-Assisted Data Hiding Based Approach in Building High-Performance Trusted Computing Systems}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {93--96}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559062}, doi = {10.1109/HST.2008.4559062}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/TaylorYWQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/WangTP08, author = {Xiaoxiao Wang and Mohammad Tehranipoor and Jim Plusquellic}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {15--19}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559039}, doi = {10.1109/HST.2008.4559039}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/WangTP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/WolffP08, author = {Francis G. Wolff and Christos A. Papachristou}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {An Embedded Flash Memory Vault for Software Trojan Protection}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {97--99}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559063}, doi = {10.1109/HST.2008.4559063}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/WolffP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/host/2008, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4556640/proceeding}, isbn = {978-1-4244-2401-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.