Default Cover Image

2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)

June 2 2013 to June 3 2013

Austin, TX, USA USA

ISBN: 978-1-4799-0559-1

Table of Contents

Papers
Cloning Physically Unclonable FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
[Title pages]Freely available from IEEE.pp. i-viii
Papers
Enhancing fault sensitivity analysis through templatesFull-text access may be available. Sign in or learn about subscription options.pp. 25-28
Papers
BISA: Built-in self-authentication for preventing hardware Trojan insertionFull-text access may be available. Sign in or learn about subscription options.pp. 45-50
Papers
On-chip lightweight implementation of reduced NIST randomness test suiteFull-text access may be available. Sign in or learn about subscription options.pp. 93-98
Papers
Frontside laser fault injection on cryptosystems - Application to the AES' last round -Full-text access may be available. Sign in or learn about subscription options.pp. 119-124
Papers
Stability analysis of a physical unclonable function based on metal resistance variationsFull-text access may be available. Sign in or learn about subscription options.pp. 143-150
Papers
Hardware implementations of the WG-5 cipher for passive RFID tagsFull-text access may be available. Sign in or learn about subscription options.pp. 29-34
Papers
A bulk built-in sensor for detection of fault attacksFull-text access may be available. Sign in or learn about subscription options.pp. 51-54
Papers
On implementing trusted boot for embedded systemsFull-text access may be available. Sign in or learn about subscription options.pp. 75-80
Papers
Cycle-accurate information assurance by proof-carrying based signal sensitivity tracingFull-text access may be available. Sign in or learn about subscription options.pp. 99-106
Papers
Side-Channel Analysis of MAC-KeccakFull-text access may be available. Sign in or learn about subscription options.pp. 125-130
Papers
Error-tolerant bit generation techniques for use with a hardware-embedded path delay PUFFull-text access may be available. Sign in or learn about subscription options.pp. 151-158
Papers
Localized electromagnetic analysis of RO PUFsFull-text access may be available. Sign in or learn about subscription options.pp. 19-24
Papers
Model building attacks on Physically Unclonable Functions using genetic programmingFull-text access may be available. Sign in or learn about subscription options.pp. 41-44
Papers
An efficient algorithm for identifying security relevant logic and vulnerabilities in RTL designsFull-text access may be available. Sign in or learn about subscription options.pp. 61-66
Papers
Malicious circuitry detection using fast timing characterization via test pointsFull-text access may be available. Sign in or learn about subscription options.pp. 113-118
Papers
Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noiseFull-text access may be available. Sign in or learn about subscription options.pp. 137-142
Papers
Novel strong PUF based on nonlinearity of MOSFET subthreshold operationFull-text access may be available. Sign in or learn about subscription options.pp. 13-18
Papers
Adapting voltage ramp-up time for temperature noise reduction on memory-based PUFsFull-text access may be available. Sign in or learn about subscription options.pp. 35-40
Papers
Structural transformation for best-possible obfuscation of sequential circuitsFull-text access may be available. Sign in or learn about subscription options.pp. 55-60
Papers
Low-cost and area-efficient FPGA implementations of lattice-based cryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 81-86
Papers
On hardware Trojan design and implementation at register-transfer levelFull-text access may be available. Sign in or learn about subscription options.pp. 107-112
Papers
Pre-processing power traces with a phase-sensitive detectorFull-text access may be available. Sign in or learn about subscription options.pp. 131-136
Showing 27 out of 27