


default search action
HOST 2017: McLean, VA, USA
- 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017, McLean, VA, USA, May 1-5, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-3929-0
- André Schaller, Wenjie Xiong
, Nikolaos Athanasios Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security. 1-7 - Misiker Tadesse Aga, Zelalem Birhanu Aweke, Todd M. Austin:
When good protections go bad: Exploiting anti-DoS measures to accelerate rowhammer attacks. 8-13 - Michel A. Kinsy, Shreeya Khadka, Mihailo Isakov, Anam Farrukh:
Hermes: Secure heterogeneous multicore architecture design. 14-20 - Kanad Sinha, Vasileios P. Kemerlis
, Simha Sethumadhavan:
Reviving instruction set randomization. 21-28 - Zhaoying Hu, Shu-Jen Han:
Creating security primitive by nanoscale manipulation of carbon nanotubes. 29-34 - Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl:
Automatic generation of high-performance modular multipliers for arbitrary mersenne primes on FPGAs. 35-40 - Subhadeep Banik
, Andrey Bogdanov
, Francesco Regazzoni
:
Efficient configurations for block ciphers with unified ENC/DEC paths. 41-46 - Ye Yuan
, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card. 47-50 - Leonid Azriel, Shahar Kvatinsky:
Towards a memristive hardware secure hash function (MemHash). 51-55 - Mostafa M. I. Taha, Arash Reyhani-Masoleh, Patrick Schaumont
:
Stateless leakage resiliency from NLFSRs. 56-61 - Debayan Das
, Shovan Maity, Saad Bin Nasir
, Santosh Ghosh, Arijit Raychowdhury, Shreyas Sen:
High efficiency power side-channel attack immunity using noise injection in attenuated signature domain. 62-67 - Chongxi Bao, Ankur Srivastava
:
Exploring timing side-channel attacks on path-ORAMs. 68-73 - Elad Carmon, Jean-Pierre Seifert, Avishai Wool
:
Photonic side channel attacks against RSA. 74-78 - Martin S. Kelly, Keith Mayes, John F. Walker:
Characterising a CPU fault attack model via run-time data analysis. 79-84 - Michael Theodorides, David A. Wagner:
Breaking active-set backward-edge CFI. 85-89 - Kiruba Sankaran Subramani, Angelos Antonopoulos, Ahmed Attia Abotabl
, Aria Nosratinia, Yiorgos Makris
:
INFECT: INconspicuous FEC-based Trojan: A hardware attack on an 802.11a/g wireless network. 90-94 - Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, Yier Jin
:
AppSAT: Approximately deobfuscating integrated circuits. 95-100 - Joseph McMahan, Weilong Cui, Liang Xia, Jeff Heckey, Frederic T. Chong
, Timothy Sherwood
:
Challenging on-chip SRAM security with boot-state statistics. 101-105 - Taimour Wehbe, Vincent John Mooney, Abdul Qadir Javaid, Omer T. Inan:
A novel physiological features-assisted architecture for rapidly distinguishing health problems from hardware Trojan attacks and errors in medical devices. 106-109 - Andrew M. Smith, Jackson R. Mayo, Vivian Kammler, Robert C. Armstrong, Yevgeniy Vorobeychik:
Using computational game theory to guide verification and security in hardware designs. 110-115 - Goutham Pocklassery, Venkata K. Kajuruli, James F. Plusquellic, Fareena Saqib:
Physical unclonable functions and dynamic partial reconfiguration for security in resource-constrained embedded systems. 116-121 - Hoda Maleki, Reza Rahaeimehr, Chenglu Jin, Marten van Dijk
:
New clone-detection approach for RFID-based supply chains. 122-127 - Vincent Immler
, Matthias Hiller
, Johannes Obermaier
, Georg Sigl:
Take a moment and have some t: Hypothesis testing on raw PUF data. 128-129 - Aydin Aysu, Ye Wang, Patrick Schaumont
, Michael Orshansky:
A new maskless debiasing method for lightweight physical unclonable functions. 134-139 - Troy Bryant, Sreeja Chowdhury, Domenic Forte
, Mark M. Tehranipoor, Nima Maghari:
A stochastic all-digital weak physically unclonable function for analog/mixed-signal applications. 140-145 - Vinay C. Patil, Arunkumar Vijayakumar, Daniel E. Holcomb, Sandip Kundu:
Improving reliability of weak PUFs via circuit techniques to enhance mismatch. 146-150 - Bertrand Cambou, Fatemeh Afghah, Derek Sonderegger, Jennifer Taggart, Hugh J. Barnaby, Michael N. Kozicki:
Ag conductive bridge RAMs for physical unclonable functions. 151 - Michael Vai, Karen Gettings, Theodore Lyszczarz:
Fabrication security and trust of domain-specific ASIC processors. 152 - Zelalem Birhanu Aweke, Todd M. Austin:
Øzone: Efficient execution with zero timing leakage for modern microarchitectures. 153 - Christopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu:
LWE-based lossless computational fuzzy extractor for the Internet of Things. 154 - Alexandres Andreou, Andrey Bogdanov
, Elmar Tischhauser
:
Cache timing attacks on recent microarchitectures. 155 - Jaya Dofe, Qiaoyan Yu:
Analyzing security vulnerabilities of three-dimensional integrated circuits. 156 - Wenjie Che
, Jim Plusquellic, Fareena Saqib:
A novel offset method for improving bitstring quality of a Hardware-Embedded delay PUF. 157 - Mitsuru Shiozaki, Takaya Kubota, Masashi Nakano, Yuuki Nakazawa, Takeshi Fujino:
Malicious CAN-message attack against advanced driving assistant system. 158 - Magnus Sundal, Ricardo Chaves
:
Improving FPGA based SHA-3 structures. 159 - Brian Koziel, Reza Azarderakhsh, David Jao:
On secure implementations of quantum-resistant supersingular isogeny Diffie-Hellman. 160 - Vaibhav Venugopal Rao, Ioannis Savidis:
Parameter biasing obfuscation for analog IP protection. 161 - Yu-Yun Dai, Robert K. Brayton:
Circuit recognition with deep learning. 162 - Peter Samarin, Kerstin Lemke-Rust:
Detection of counterfeit ICs using public identification sequences. 163 - Asmit De, Swaroop Ghosh:
Threshold voltage defined multi-input complex gates. 164 - Joseph Sagisi, Joseph G. Tront, Randy C. Marchany:
Platform agnostic, scalable, and unobtrusive FPGA network processor design of moving target defense over IPv6 (MT6D) over IEEE 802.3 Ethernet. 165 - Muhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu:
TTLock: Tenacious and traceless logic locking. 166 - Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse. 167 - Chris Pavlina, Jacob Torrey, Kyle Temkin:
Abstract: Characterizing EEPROM for usage as a ubiquitous PUF source. 168 - Thomas Broadfoot, Carl Sechen, Jeyavijayan (JV) Rajendran:
On designing optimal camouflaged layouts. 169 - Tara Merin John, Syed Kamran Haider, Hamza Omar, Marten van Dijk:
Connecting the dots: Privacy leakage via write-access patterns to the main memory. 170 - Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava:
Correlation power analysis attack against STT-MRAM based cyptosystems. 171 - Christophe Bobda, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Synthesis of hardware sandboxes for Trojan mitigation in systems on chip. 172

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.