Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ASIANHOST
ASIANHOST 2017
Generate Citations
2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)
Oct. 19 2017 to Oct. 20 2017
Beijing, China
Table of Contents
[Front matter]
Freely available from IEEE.
pp. 1-12
DOST: Dynamically obfuscated wrapper for split test against IC piracy
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Xiaoxiao Wang
,
Yueyu Guo
,
Tauhid Ramhan
,
Dongrong Zhang
,
Mark Tehranipoor
PUFSec: Protecting physical unclonable functions using hardware isolation-based system security techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-12
by
Mengmei Ye
,
Mehrdad Zaker Shahrak
,
Sheng Wei
Implementation of stable PUFs using gate oxide breakdown
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-18
by
Wei-Che Wang
,
Yair Yona
,
Yizhang Wu
,
Szu-Yao Hung
,
Suhas Diggavi
,
Puneet Gupta
A new key rank estimation method to investigate dependent key lists of side channel attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-24
by
Shuang Wang
,
Yang Li
,
Jian Wang
MPA: Model-assisted PCB attestation via board-level RO and temperature compensation
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-30
by
Zimu Guo
,
Xiaolin Xu
,
Mark M. Tehranipoor
,
Domenic Forte
The impact of discharge inversion effect on learning SRAM power-up statistics
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-36
by
Zhonghao Liao
,
George T. Amariucai
,
Raymond K. W. Wong
,
Yong Guan
An energy-efficient true random number generator based on current starved ring oscillators
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-42
by
Yuan Cao
,
Chip-Hong Chang
,
Yue Zheng
,
Xiaojin Zhao
Polymorphic PUF: Exploiting reconfigurability of CPU+FPGA SoC to resist modeling attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-48
by
Jing Ye
,
Yue Gong
,
Yu Hu
,
Xiaowei Li
Improved low-entropy masking scheme for LED with mitigation against correlation-enhanced collision attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-54
by
Fan Zhang
,
Liang Geng
,
Jizhong Shen
,
Shivam Bhasin
,
Xinjie Zhao
,
Shize Guo
A practical cold boot attack on RSA private keys
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-60
by
Tian Wang
,
Xiaoxin Cui
,
Yewen Ni
,
Dunshan Yu
,
Xiaole Cui
,
Gang Qu
A split manufacturing approach for unclonable chipless RFIDs for pharmaceutical supply chain security
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-66
by
Kun Yang
,
Ulbert Botero
,
Haoting Shen
,
Domenic Forte
,
Mark Tehranipoor
Extending 1kb RRAM array from weak PUF to strong PUF by employment of SHA module
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-72
by
Rui Liu
,
Huaqiang Wu
,
Yachun Pang
,
He Qian
,
Shimeng Yu
Mixed-granular architectural diversity for device security in the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-78
by
Robert Karam
,
Tamzidul Hoque
,
Kevin Butler
,
Swarup Bhunia
PCH framework for IP runtime security verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-84
by
Xiaolong Guo
,
Raj Gautam Dutta
,
Jiaji He
,
Yier Jin
Scalable security path methodology: A cost-security trade-off to protect FPGA IPs against active and passive tampers
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-90
by
Sharareh Zamanzadeh
,
Ali Jahanian
On-chip jitter measurement for true random number generators
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-96
by
Bohan Yang
,
Vladimir Rožić
,
Miloš Grujić
,
Nele Mentens
,
Ingrid Verbauwhede
Secure intra-vehicular communication over CANFD
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-102
by
Ali Shuja Siddiqui
,
Chia-Che Lee
,
Wenjie Che
,
Jim Plusquellic
,
Fareena Saqib
Secure integration of non-trusted IPs in SoCs
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-108
by
Festus Hategekimana
,
Taylor J L Whitaker
,
Md Jubaer Hossain Pantho
,
Christophe Bobda
Employing dual-complementary flip-flops to detect EMFI attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-114
by
Chinmay Deshpande
,
Bilgiday Yuce
,
Leyla Nazhandali
,
Patrick Schaumont
Obfuscating branch decisions based on encrypted data using MISR and hash digests
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-120
by
Nektarios Georgios Tsoutsos
,
Michail Maniatakos
'The danger of sleeping', an exploration of security in non-volatile processors
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-126
by
Patrick Cronin
,
Chengmo Yang
,
Dongqin Zhou
,
Keni Qiu
,
Xin Shi
,
Yongpan Liu
Evaluating obfuscation performance of novel algorithm-to-architecture mapping techniques in systolic-array-based circuits
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-132
by
Xiaojun Zhou
,
Jiafeng Xie
Showing 23 out of 23