Default Cover Image

2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)

May 1 2017 to May 5 2017

Mclean, VA, USA

Table of Contents

[Front matter]Freely available from IEEE.pp. i-xxxiv
When good protections go bad: Exploiting anti-DoS measures to accelerate rowhammer attacksFull-text access may be available. Sign in or learn about subscription options.pp. 8-13
Hermes: Secure heterogeneous multicore architecture designFull-text access may be available. Sign in or learn about subscription options.pp. 14-20
Reviving instruction set randomizationFull-text access may be available. Sign in or learn about subscription options.pp. 21-28
Creating security primitive by nanoscale manipulation of carbon nanotubesFull-text access may be available. Sign in or learn about subscription options.pp. 29-34
Efficient configurations for block ciphers with unified ENC/DEC pathsFull-text access may be available. Sign in or learn about subscription options.pp. 41-46
Towards a memristive hardware secure hash function (MemHash)Full-text access may be available. Sign in or learn about subscription options.pp. 51-55
Stateless leakage resiliency from NLFSRsFull-text access may be available. Sign in or learn about subscription options.pp. 56-61
Exploring timing side-channel attacks on path-ORAMsFull-text access may be available. Sign in or learn about subscription options.pp. 68-73
Photonic side channel attacks against RSAFull-text access may be available. Sign in or learn about subscription options.pp. 74-78
Characterising a CPU fault attack model via run-time data analysisFull-text access may be available. Sign in or learn about subscription options.pp. 79-84
Breaking active-set backward-edge CFIFull-text access may be available. Sign in or learn about subscription options.pp. 85-89
AppSAT: Approximately deobfuscating integrated circuitsFull-text access may be available. Sign in or learn about subscription options.pp. 95-100
Challenging on-chip SRAM security with boot-state statisticsFull-text access may be available. Sign in or learn about subscription options.pp. 101-105
New clone-detection approach for RFID-based supply chainsFull-text access may be available. Sign in or learn about subscription options.pp. 122-127
Take a moment and have some t: Hypothesis testing on raw PUF dataFull-text access may be available. Sign in or learn about subscription options.pp. 128-129
A new maskless debiasing method for lightweight physical unclonable functionsFull-text access may be available. Sign in or learn about subscription options.pp. 134-139
Improving reliability of weak PUFs via circuit techniques to enhance mismatchFull-text access may be available. Sign in or learn about subscription options.pp. 146-150
Ag conductive bridge RAMs for physical unclonable functionsFull-text access may be available. Sign in or learn about subscription options.pp. 151-151
Fabrication security and trust of domain-specific ASIC processorsFull-text access may be available. Sign in or learn about subscription options.pp. 152-152
Øzone: Efficient execution with zero timing leakage for modern microarchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 153-153
LWE-based lossless computational fuzzy extractor for the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 154-154
Cache timing attacks on recent microarchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 155-155
Analyzing security vulnerabilities of three-dimensional integrated circuitsFull-text access may be available. Sign in or learn about subscription options.pp. 156-156
A novel offset method for improving bitstring quality of a Hardware-Embedded delay PUFFull-text access may be available. Sign in or learn about subscription options.pp. 157-157
Malicious CAN-message attack against advanced driving assistant systemFull-text access may be available. Sign in or learn about subscription options.pp. 158-158
Improving FPGA based SHA-3 structuresFull-text access may be available. Sign in or learn about subscription options.pp. 159-159
On secure implementations of quantum-resistant supersingular isogeny Diffie-HellmanFull-text access may be available. Sign in or learn about subscription options.pp. 160-160
Parameter biasing obfuscation for analog IP protectionFull-text access may be available. Sign in or learn about subscription options.pp. 161-161
Circuit recognition with deep learningFull-text access may be available. Sign in or learn about subscription options.pp. 162-162
Detection of counterfeit ICs using public identification sequencesFull-text access may be available. Sign in or learn about subscription options.pp. 163-163
Threshold voltage defined multi-input complex gatesFull-text access may be available. Sign in or learn about subscription options.pp. 164-164
TTLock: Tenacious and traceless logic lockingFull-text access may be available. Sign in or learn about subscription options.pp. 166-166
Abstract: Characterizing EEPROM for usage as a ubiquitous PUF sourceFull-text access may be available. Sign in or learn about subscription options.pp. 168-168
On designing optimal camouflaged layoutsFull-text access may be available. Sign in or learn about subscription options.pp. 169-169
Connecting the dots: Privacy leakage via write-access patterns to the main memoryFull-text access may be available. Sign in or learn about subscription options.pp. 170-170
Correlation power analysis attack against STT-MRAM based cyptosystemsFull-text access may be available. Sign in or learn about subscription options.pp. 171-171
Synthesis of hardware sandboxes for Trojan mitigation in systems on chipFull-text access may be available. Sign in or learn about subscription options.pp. 172-172
Showing 49 out of 49