Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
HOST
HOST 2013
Generate Citations
2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
June 2 2013 to June 3 2013
Austin, TX, USA USA
ISBN: 978-1-4799-0559-1
Table of Contents
Papers
Cloning Physically Unclonable Functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Clemens Helfmeier
,
Christian Boit
[Title pages]
Freely available from IEEE.
pp. i-viii
Papers
Enhancing fault sensitivity analysis through templates
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-28
by
Filippo Melzani
,
Andrea Palomba
Papers
BISA: Built-in self-authentication for preventing hardware Trojan insertion
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-50
by
Kan Xiao
,
Mohammed Tehranipoor
Papers
WordRev: Finding word-level structures in a sea of bit-level gates
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-74
by
Wenchao Li
,
Adria Gascon
,
Pramod Subramanyan
,
Wei Yang Tan
,
Ashish Tiwari
,
Sharad Malik
,
Natarajan Shankar
,
Sanjit A. Seshia
Papers
On-chip lightweight implementation of reduced NIST randomness test suite
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-98
by
Vikram B. Suresh
,
Daniele Antonioli
,
Wayne P. Burleson
Papers
Frontside laser fault injection on cryptosystems - Application to the AES' last round -
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-124
by
Assia Tria
Papers
Stability analysis of a physical unclonable function based on metal resistance variations
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-150
by
J. Ju
,
R. Chakraborty
,
C. Lamech
,
J. Plusquellic
Papers
Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-12
by
Stephanie Kerckhof
,
Francois Durvaux
,
Francois-Xavier Standaert
,
Benoit Gerard
Papers
Hardware implementations of the WG-5 cipher for passive RFID tags
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-34
by
Mark D. Aagaard
,
Guang Gong
,
Rajesh K. Mota
Papers
A bulk built-in sensor for detection of fault attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-54
by
R. Possamai Bastos
,
F. Sill Torres
,
J.-M. Dutertre
,
M.-L. Flottes
,
G. Di Natale
,
B. Rouzeyre
Papers
On implementing trusted boot for embedded systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-80
by
Obaid Khalid
,
Carsten Rolfes
,
Andreas Ibing
Papers
Cycle-accurate information assurance by proof-carrying based signal sensitivity tracing
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-106
by
Yier Jin
,
Bo Yang
,
Yiorgos Makris
Papers
Side-Channel Analysis of MAC-Keccak
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-130
by
Mostafa Taha
,
Patrick Schaumont
Papers
Error-tolerant bit generation techniques for use with a hardware-embedded path delay PUF
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-158
by
J. Aarestad
,
J. Plusquellic
,
D. Acharyya
Papers
Localized electromagnetic analysis of RO PUFs
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-24
by
Dominik Merli
,
Johann Heyszl
,
Benedikt Heinz
,
Dieter Schuster
,
Frederic Stumpf
,
Georg Sigl
Papers
Model building attacks on Physically Unclonable Functions using genetic programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-44
by
Indrasish Saha
,
Ratan Rahul Jeldi
,
Rajat Subhra Chakraborty
Papers
An efficient algorithm for identifying security relevant logic and vulnerabilities in RTL designs
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-66
by
David W. Palmer
,
Parbati Kumar Manna
Papers
Design and implementation of rotation symmetric S-boxes with high nonlinearity and high DPA resilience
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-92
by
Bodhisatwa Mazumdar
,
Debdeep Mukhopadhyay
,
Indranil Sengupta
Papers
Malicious circuitry detection using fast timing characterization via test points
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-118
by
Sheng Wei
,
Miodrag Potkonjak
Papers
Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-142
by
Jeroen Delvaux
,
Ingrid Verbauwhede
Papers
Novel strong PUF based on nonlinearity of MOSFET subthreshold operation
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-18
by
Mukund Kalyanaraman
,
Michael Orshansky
Papers
Adapting voltage ramp-up time for temperature noise reduction on memory-based PUFs
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-40
by
Mafalda Cortez
,
Said Hamdioui
,
Vincent van der Leest
,
Roel Maes
,
Geert-Jan Schrijen
Papers
Structural transformation for best-possible obfuscation of sequential circuits
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-60
by
Li Li
,
Hai Zhou
Papers
Low-cost and area-efficient FPGA implementations of lattice-based cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-86
by
Aydin Aysu
,
Cameron Patterson
,
Patrick Schaumont
Papers
On hardware Trojan design and implementation at register-transfer level
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-112
Papers
Pre-processing power traces with a phase-sensitive detector
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-136
by
P. Hodgers
,
N. Hanley
,
M. O'Neill
Showing 27 out of 27