Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
HOST
HOST 2022
Generate Citations
2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
June 27 2022 to June 30 2022
McLean, VA, USA
ISBN: 978-1-6654-8532-6
Table of Contents
Proceedings of the 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
Freely available from IEEE.
pp. i-xxxv
EnclaveSim:A Micro-architectural Simulator with Enclave Support
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Yashika Verma
,
Dixit Kumar
,
Biswabandan Panda
Towards Attack Resilient Delay-Based Strong PUFs
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-8
by
Nils Wisiol
Security Properties Driven Pre-Silicon Laser Fault Injection Assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-12
by
Nitin Pundir
,
Henian Li
,
Lang Lin
,
Norman Chang
,
Farimah Farahmandi
,
Mark Tehranipoor
Warm Up before Circuit De-obfuscation? An Exploration through Bounded-Model-Checkers
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-16
by
Kimia Zamiri Azar
,
Hadi Mardani Kamali
,
Farimah Farahmandi
,
Mark Tehranipoor
Layout-level Vulnerability Ranking from Electromagnetic Fault Injection
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-20
by
Lang Lin
,
Jimin Wen
,
Harsh Shrivastav
,
Weike Li
,
Hua Chen
,
Gang Ni
,
Sreeja Chowdhury
,
Calvin Chow
,
Norman Chang
Structural Analysis Attack on Sequential Circuit Logic Locking
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-24
by
Gourav Takhar
,
Subhajit Roy
A Novel Attack on Machine-Learning Resistant Physical Unclonable Functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-28
by
Daniel Canaday
,
Wendson A. S. Barbosa
,
Andrew Pomerance
System on Chip (SoC) Security Architecture Framework for Isolated Domains Against Threats
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-32
by
Siam Haque
,
Shahnam Mirzaei
Security Threats and Countermeasure Deployment Using Partial Reconfiguration in FPGA CAD Tools
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-36
by
Sandeep Sunkavilli
,
Qiaoyan Yu
Towards an Antivirus for Quantum Computers
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-40
by
Sanjay Deshpande
,
Chuanqi Xu
,
Theodoros Trochatos
,
Yongshan Ding
,
Jakub Szefer
SecSoC: A Secure System on Chip Architecture for IoT Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-44
by
Ayman Hroub
,
Muhammad E. S. Elrabaa
Characterizing Side-Channel Leakage of DNN Classifiers though Performance Counters
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-48
by
Saikat Majumdar
,
Mohammad Hossein Samavatian
,
Radu Teodorescu
Detecting Continuous Jamming Attack using Ultra-low Power RSSI Circuit
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-52
by
Ankit Mittal
,
Aatmesh Shrivastava
Secuirty Metrics for Logic Circuits
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-56
by
Ruben Purdy
,
Danielle Duvalsaint
,
R. D. Shawn Blanton
SpecPref: High Performing Speculative Attacks Resilient Hardware Prefetchers
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-60
by
Tarun Solanki
,
Biswabandan Panda
pHGen: A pH-Based Key Generation Mechanism Using ISFETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-64
by
Elmira Moussavi
,
Dominik Sisejkovic
,
Fabian Brings
,
Daniyar Kizatov
,
Animesh Singh
,
Xuan Thang Vu
,
Rainer Leupers
,
Sven Ingebrandt
,
Vivek Pachauri
,
Farhad Merchant
Safeguarding Unmanned Aerial Vehicles Against Side Channel Analysis Via Motor Noise Injection
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-68
by
Timothy Radtke
,
Cristinel Ababei
WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-72
by
Markku-Juhani O. Saarinen
Chosen-Plaintext Attack on Energy-Efficient Hardware Implementation of GIFT-COFB
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-76
by
Yadi Zhong
,
Ujjwal Guin
Error Correction Attacks on BACnet MS/TP
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-80
by
Tsion Yimer
,
Edmund Smith
,
Paige Harvey
,
Marcial Tienteu
,
Kevin Kornegay
Insertion of random delay with context-aware dummy instructions generator in a RISC-V processor
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-84
by
Gaëtan Leplus
,
Olivier Savry
,
Lilian Bossuet
Contact PUF: Highly Stable Physical Unclonable Functions Based on Contact Failure Probability in 180 nm, 130 nm, and 28 nm CMOS Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-88
by
Duhyun Jeon
,
Dongmin Lee
,
Dong Kyue Kim
,
Byong-Deok Choi
Efficient Targeted Bit-Flip Attack Against the Local Binary Pattern Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-92
by
Arman Roohi
,
Shaahin Angizi
Efficient and Side-Channel Resistant Design of High-Security Ed448 on ARM Cortex-M4
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-96
by
Mila Anastasova
,
Mojtaba Bisheh-Niasar
,
Hwajeong Seo
,
Reza Azarderakhsh
,
Mehran Mozaffari Kermani
Detecting Laser Fault Injection Attacks via Time-to-Digital Converter Sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-100
by
Mohammad Ebrahimabadi
,
Suhee Sanjana Mehjabin
,
Raphael Viera
,
Sylvain Guilley
,
Jean-Luc Danger
,
Jean-Max Dutertre
,
Naghmeh Karimi
True Random Number Generation with the Shift-register Reconvergent-Fanout (SiRF) PUF
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-104
by
Nafis Irtija
,
Eirini Eleni Tsiropoulou
,
Cyrus Minwalla
,
Jim Plusquellic
Dynamic Key Updates for LUT Locked Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-108
by
Jakub Slowik
,
Gregory Williams
,
Rummah Albashir
,
Anthony Samagio
,
Geraldine Shirley Nicholas
,
Fareena Saqib
PCB Component Detection for Hardware Assurance: A Feature Selection-based Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-112
by
Shajib Ghosh
,
Mohammad Tahsin Mostafiz
,
Suprith Reddy Gurudu
,
Shayan Taheri
,
Navid Asadizanjani
Metrics for Assessing Security of System-on-Chip
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-116
by
Sujan Kumar Saha
,
Joel Mandebi Mbongue
,
Christophe Bobda
FTC: A Universal Sensor for Fault Injection Attack Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-120
by
Md Rafid Muttaki
,
Tao Zhang
,
Mark Tehranipoor
,
Farimah Farahmandi
Hardware Trojan Detection at LUT: Where Structural Features Meet Behavioral Characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-124
by
Lingjuan Wu
,
Xuelin Zhang
,
Siyi Wang
,
Wei Hu
Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-128
by
Anita Aghaie
,
Amir Moradi
,
Johannes Tobisch
,
Nils Wisiol
Mathematical Model of Strong Physically Unclonable Functions Based on Hybrid Boolean Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-132
by
Noeloikeau Charlot
,
Daniel J. Gauthier
,
Daniel Canaday
,
Andrew Pomerance
On the Feasibility of Training-time Trojan Attacks through Hardware-based Faults in Memory
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-136
by
Kunbei Cai
,
Zhenkai Zhang
,
Fan Yao
Identification and Classification of Corrupted PUF Responses via Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-140
by
Reshmi Suragani
,
Emiliia Nazarenko
,
Nikolaos Athanasios Anagnostopoulos
,
Nico Mexis
,
Elif Bilge Kavun
Hardening Hardware Accelerartor Based CNN Inference Phase Against Adversarial Noises
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-144
by
Tolulope A. Odetola
,
Adewale Adeyemo
,
Syed Rafay Hasan
Global Attack and Remedy on IC-Specific Logic Encryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-148
by
Amin Rezaei
,
Ava Hedayatipour
,
Hossein Sayadi
,
Mehrdad Aliasgari
,
Hai Zhou
Evaluating the Impact of Hardware Faults on Program Execution in a Microkernel Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-152
by
Yohannes B. Bekele
,
Daniel B. Limbrick
Practical Performance of Analog Attack Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-156
by
Vaibhav Venugopal Rao
,
Kyle Juretus
,
Ioannis Savidis
Systolic Acceleration of Polynomial Multiplication for KEM Saber and Binary Ring-LWE Post-Quantum Cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-160
by
Tianyou Bao
,
Pengzhou He
,
Jiafeng Xie
A Lightweight Mutual Authentication Protocol Based on Physical Unclonable Functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-164
by
Saeed Abdolinezhad
,
Axel Sikora
Oblivious Intrusion Detection System
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-168
by
Mahmoud Abdelhafeez Sayed
,
Mostafa Taha
A Modeling Attack on the Sub-threshold Current Array PUF
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-172
by
Yun Liu
,
Yongliang Chen
,
Xiaole Cui
Partial Reconfiguration for Run-time Memory Faults and Hardware Trojan Attacks Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-176
by
Ying Li
,
Lan Chen
,
Jian Wang
,
Guanfei Gong
Securing Hardware Accelerator during High-level Synthesis
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-180
by
Dipanjan Roy
,
Sabiya Jani Shaik
,
Sonam Sharma
PUF-based Secure Test Wrapper Design for Network-on-Chip
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-184
by
Ying Zhang
,
Yuanxiang Li
,
Xin Chen
,
Jizhong Yang
,
Yifeng Hua
,
Jiaoyan Yao
Showing 47 out of 47