default search action
AsianHOST 2018: Hong Kong, China
- Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2018, Hong Kong, China, December 17-18, 2018. IEEE 2018, ISBN 978-1-5386-7471-0
- Love Kumar Sah, Sheikh Ariful Islam, Srinivas Katkoori:
An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow Attacks. 1-6 - Shalabh Jain, Qian Wang, Md Tanvir Arafin, Jorge Guajardo:
Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks. 7-12 - Bo Ning, Qiang Liu:
Modeling and Efficiency Analysis of Clock Glitch Fault Injection Attack. 13-18 - Xiaofei Dong, Fan Zhang, Samiya Qureshi, Yiran Zhang, Ziyuan Liang, Bolin Yang, Feng Gao:
A Wavelet-based Power Analysis Attack against Random Delay Countermeasure. 19-24 - Horacio L. França, Charles B. Prado, Vinay C. Patil, Sandip Kundu:
Defeating Strong PUF Modeling Attack via Adverse Selection of Challenge-Response Pairs. 25-30 - Wenjie Li, Jing Ye, Xiaowei Li, Huawei Li, Yu Hu:
Bias PUF based Secure Scan Chain Design. 31-36 - Zhonghao Liao, Yong Guan:
The Cell Dependency Analysis on Learning SRAM Power-Up States. 37-43 - K. A. Asha, Abhishek Patyal, Hung-Ming Chen:
Generation of PUF-Keys on FPGAs by K-means Frequency Clustering. 44-49 - Haihan Su, Jiliang Zhang:
Machine Learning Attacks on Voltage Over-scaling-based Lightweight Authentication. 50-55 - Prabuddha Chakraborty, Jonathan Cruz, Swarup Bhunia:
SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation. 56-61 - Mihailo Isakov, Lake Bu, Hai Cheng, Michel A. Kinsy:
Preventing Neural Network Model Exfiltration in Machine Learning Hardware Accelerators. 62-67 - Farhath Zareen, Robert Karam:
Detecting RTL Trojans using Artificial Immune Systems and High Level Behavior Classification. 68-73 - Peng Gu, Dylan C. Stow, Prashansa Mukim, Shuangchen Li, Yuan Xie:
Cost-efficient 3D Integration to Hinder Reverse Engineering During and After Manufacturing. 74-79 - Rongjun Tan, Yuan Gao, Haixia He, Yuan Cao:
Secrecy Performance of Cognitive Radio Sensor Networks with an Energy-Harvesting based Eavesdropper and Imperfect CSI. 80-85 - Qian Wang, Yiming Qian, Zhaojun Lu, Yasser Shoukry, Gang Qu:
A Delay based Plug-in-Monitor for Intrusion Detection in Controller Area Network. 86-91 - Muhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Vianney Lapotre, Guy Gogniat, Arnab Kumar Biswas:
A novel lightweight hardware-assisted static instrumentation approach for ARM SoC using debug components. 92-97 - Qihang Shi, Huanyu Wang, Navid Asadizanjani, Mark M. Tehranipoor, Domenic Forte:
A Comprehensive Analysis on Vulnerability of Active Shields to Tilted Microprobing Attacks. 98-103 - Mehmet Alp Sarkisla, Salih Ergun:
Ring Oscillator Based Random Number Generator Using Wake-up and Shut-down Uncertainties. 104-108 - Sheikh Ariful Islam, Love Kumar Sah, Srinivas Katkoori:
Empirical Word-Level Analysis of Arithmetic Module Architectures for Hardware Trojan Susceptibility. 109-114
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.