Default Cover Image

2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)

Oct. 19 2017 to Oct. 20 2017

Beijing, China

Table of Contents

[Front matter]Freely available from IEEE.pp. 1-12
DOST: Dynamically obfuscated wrapper for split test against IC piracyFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Implementation of stable PUFs using gate oxide breakdownFull-text access may be available. Sign in or learn about subscription options.pp. 13-18
A new key rank estimation method to investigate dependent key lists of side channel attacksFull-text access may be available. Sign in or learn about subscription options.pp. 19-24
MPA: Model-assisted PCB attestation via board-level RO and temperature compensationFull-text access may be available. Sign in or learn about subscription options.pp. 25-30
The impact of discharge inversion effect on learning SRAM power-up statisticsFull-text access may be available. Sign in or learn about subscription options.pp. 31-36
An energy-efficient true random number generator based on current starved ring oscillatorsFull-text access may be available. Sign in or learn about subscription options.pp. 37-42
Polymorphic PUF: Exploiting reconfigurability of CPU+FPGA SoC to resist modeling attackFull-text access may be available. Sign in or learn about subscription options.pp. 43-48
A practical cold boot attack on RSA private keysFull-text access may be available. Sign in or learn about subscription options.pp. 55-60
Extending 1kb RRAM array from weak PUF to strong PUF by employment of SHA moduleFull-text access may be available. Sign in or learn about subscription options.pp. 67-72
Mixed-granular architectural diversity for device security in the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 73-78
PCH framework for IP runtime security verificationFull-text access may be available. Sign in or learn about subscription options.pp. 79-84
On-chip jitter measurement for true random number generatorsFull-text access may be available. Sign in or learn about subscription options.pp. 91-96
Secure intra-vehicular communication over CANFDFull-text access may be available. Sign in or learn about subscription options.pp. 97-102
Secure integration of non-trusted IPs in SoCsFull-text access may be available. Sign in or learn about subscription options.pp. 103-108
Employing dual-complementary flip-flops to detect EMFI attacksFull-text access may be available. Sign in or learn about subscription options.pp. 109-114
Obfuscating branch decisions based on encrypted data using MISR and hash digestsFull-text access may be available. Sign in or learn about subscription options.pp. 115-120
'The danger of sleeping', an exploration of security in non-volatile processorsFull-text access may be available. Sign in or learn about subscription options.pp. 121-126
Showing 23 out of 23