Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
HOST
HOST 2017
Generate Citations
2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
May 1 2017 to May 5 2017
Mclean, VA, USA
Table of Contents
[Front matter]
Freely available from IEEE.
pp. i-xxxiv
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Andre Schaller
,
Wenjie Xiong
,
Nikolaos Athanasios Anagnostopoulos
,
Muhammad Umair Saleem
,
Sebastian Gabmeyer
,
Stefan Katzenbeisser
,
Jakub Szefer
When good protections go bad: Exploiting anti-DoS measures to accelerate rowhammer attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 8-13
by
Misiker Tadesse Aga
,
Zelalem Birhanu Aweke
,
Todd Austin
Hermes: Secure heterogeneous multicore architecture design
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-20
by
Michel A. Kinsy
,
Shreeya Khadka
,
Mihailo Isakov
,
Anam Farrukh
Reviving instruction set randomization
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-28
by
Kanad Sinha
,
Vasileios P. Kemerlis
,
Simha Sethumadhavan
Creating security primitive by nanoscale manipulation of carbon nanotubes
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-34
by
Zhaoying Hu
,
Shu-Jen Han
Automatic generation of high-performance modular multipliers for arbitrary mersenne primes on FPGAs
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-40
by
Philipp Koppermann
,
Fabrizio De Santis
,
Johann Heyszl
,
Georg Sigl
Efficient configurations for block ciphers with unified ENC/DEC paths
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-46
by
Subhadeep Banik
,
Andrey Bogdanov
,
Francesco Regazzoni
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-50
by
Ye Yuan
,
Kazuhide Fukushima
,
Shinsaku Kiyomoto
,
Tsuyoshi Takagi
Towards a memristive hardware secure hash function (MemHash)
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-55
by
Leonid Azriel
,
Shahar Kvatinsky
Stateless leakage resiliency from NLFSRs
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-61
by
Mostafa Taha
,
Arash Reyhani-Masoleh
,
Patrick Schaumont
High efficiency power side-channel attack immunity using noise injection in attenuated signature domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-67
by
Debayan Das
,
Shovan Maity
,
Saad Bin Nasir
,
Santosh Ghosh
,
Arijit Raychowdhury
,
Shreyas Sen
Exploring timing side-channel attacks on path-ORAMs
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-73
by
Chongxi Bao
,
Ankur Srivastava
Photonic side channel attacks against RSA
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-78
by
Elad Carmon
,
Jean-Pierre Seifert
,
Avishai Wool
Characterising a CPU fault attack model via run-time data analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-84
by
Martin S. Kelly
,
Keith Mayes
,
John F. Walker
Breaking active-set backward-edge CFI
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-89
by
Michael Theodorides
,
David Wagner
INFECT: INconspicuous FEC-based Trojan: A hardware attack on an 802.11a/g wireless network
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-94
by
Kiruba Sankaran Subramani
,
Angelos Antonopoulos
,
Ahmed Attia Abotabl
,
Aria Nosratinia
,
Yiorgos Makris
AppSAT: Approximately deobfuscating integrated circuits
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-100
by
Kaveh Shamsi
,
Meng Li
,
Travis Meade
,
Zheng Zhao
,
David Z. Pan
,
Yier Jin
Challenging on-chip SRAM security with boot-state statistics
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-105
by
Joseph McMahan
,
Weilong Cui
,
Liang Xia
,
Jeff Heckey
,
Frederic T. Chong
,
Timothy Sherwood
A novel physiological features-assisted architecture for rapidly distinguishing health problems from hardware Trojan attacks and errors in medical devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-109
by
Taimour Wehbe
,
Vincent J. Mooney
,
Abdul Qadir Javaid
,
Omer T. Inan
Using computational game theory to guide verification and security in hardware designs
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-115
by
Andrew M. Smith
,
Jackson R. Mayo
,
Vivian Kammler
,
Robert C. Armstrong
,
Yevgeniy Vorobeychik
Physical unclonable functions and dynamic partial reconfiguration for security in resource-constrained embedded systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-121
by
G. Pocklassery
,
Venkata K Kajuruli
,
J. Plusquellic
,
F. Saqib
New clone-detection approach for RFID-based supply chains
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-127
by
Hoda Maleki
,
Reza Rahaeimehr
,
Chenglu Jin
,
Marten van Dijk
Take a moment and have some t: Hypothesis testing on raw PUF data
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-129
by
Vincent Immler
,
Matthias Hiller
,
Johannes Obermaier
,
Georg Sigl
A new maskless debiasing method for lightweight physical unclonable functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-139
by
Aydin Aysu
,
Ye Wang
,
Patrick Schaumont
,
Michael Orshansky
A stochastic all-digital weak physically unclonable function for analog/mixed-signal applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-145
by
Troy Bryant
,
Sreeja Chowdhury
,
Domenic Forte
,
Mark Tehranipoor
,
Nima Maghari
Improving reliability of weak PUFs via circuit techniques to enhance mismatch
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-150
by
Vinay C. Patil
,
Arunkumar Vijayakumar
,
Daniel E. Holcomb
,
Sandip Kundu
Ag conductive bridge RAMs for physical unclonable functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-151
by
Bertrand Cambou
,
Fatemeh Afghah
,
Derek Sonderegger
,
Jennifer Taggart
,
Hugh Barnaby
,
Michael Kozicki
Fabrication security and trust of domain-specific ASIC processors
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-152
by
Michael Vai
,
Karen Gettings
,
Theodore Lyszczarz
Øzone: Efficient execution with zero timing leakage for modern microarchitectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-153
by
Zelalem Birhanu Aweke
,
Todd Austin
LWE-based lossless computational fuzzy extractor for the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-154
by
Christopher Huth
,
Daniela Becker
,
Jorge Guajardo
,
Paul Duplys
,
Tim Güneysu
Cache timing attacks on recent microarchitectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-155
by
Alexandres Andreou
,
Andrey Bogdanov
,
Elmar Tischhauser
Analyzing security vulnerabilities of three-dimensional integrated circuits
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-156
by
Jaya Dofe
,
Qiaoyan Yu
A novel offset method for improving bitstring quality of a Hardware-Embedded delay PUF
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-157
by
Wenjie Che
,
Jim Plusquellic
,
Fareena Saqib
Malicious CAN-message attack against advanced driving assistant system
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-158
by
Mitsuru Shiozaki
,
Takaya Kubota
,
Masashi Nakano
,
Yuuki Nakazawa
,
Takeshi Fujino
Improving FPGA based SHA-3 structures
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-159
by
Magnus Sundal
,
Ricardo Chaves
On secure implementations of quantum-resistant supersingular isogeny Diffie-Hellman
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-160
by
Brian Koziel
,
Reza Azarderakhsh
,
David Jao
Parameter biasing obfuscation for analog IP protection
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-161
by
Vaibhav Venugopal Rao
,
Ioannis Savidis
Circuit recognition with deep learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-162
by
Yu-Yun Dai
,
Robert K. Braytont
Detection of counterfeit ICs using public identification sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-163
by
Peter Samarin
,
Kerstin Lemke-Rust
Threshold voltage defined multi-input complex gates
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-164
by
Asmit De
,
Swaroop Ghosh
Platform agnostic, scalable, and unobtrusive FPGA network processor design of moving target defense over IPv6 (MT6D) over IEEE 802.3 Ethernet
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-165
by
Joseph Sagisi
,
Joseph Tront
,
Randy Marchany Bradley
TTLock: Tenacious and traceless logic locking
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-166
by
Muhammad Yasin
,
Bodhisatwa Mazumdar
,
Jeyavijayan J V Rajendran
,
Ozgur Sinanoglu
Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-167
by
Krishna Bagadia
,
Urbi Chatterjee
,
Debapriya Basu Roy
,
Debdeep Mukhopadhyay
,
Rajat Subhra Chakraborty
Abstract: Characterizing EEPROM for usage as a ubiquitous PUF source
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-168
by
Chris Pavlina
,
Jacob Torrey
,
Kyle Temkin
On designing optimal camouflaged layouts
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-169
by
Thomas Broadfoot
,
Carl Sechen
,
Jeyavijayan J V Rajendran
Connecting the dots: Privacy leakage via write-access patterns to the main memory
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-170
by
Tara John
,
Syed Kamran Haider
,
Hamza Omar
,
Marten van Dijk
Correlation power analysis attack against STT-MRAM based cyptosystems
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-171
by
Abhishek Chakraborty
,
Ankit Mondal
,
Ankur Srivastava
Synthesis of hardware sandboxes for Trojan mitigation in systems on chip
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-172
by
Christophe Bobda
,
Taylor J L Whitaker
,
Charles Kamhoua
,
Kevin Kwiat
,
Laurent Njilla
Showing 49 out of 49