2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) : 6 - 7 May 2014, Arlington, VA, USA (Englisch)
Freier Zugriff
- Neue Suche nach: Institute of Electrical and Electronics Engineers
- Weitere Informationen zu Institute of Electrical and Electronics Engineers:
- http://d-nb.info/gnd/1692-5
- Neue Suche nach: IEEE Computer Society, Test Technology Technical Council
- Weitere Informationen zu IEEE Computer Society, Test Technology Technical Council:
- http://d-nb.info/gnd/16030549-4
- Neue Suche nach: IEEE Computer Society
- Weitere Informationen zu IEEE Computer Society:
- http://d-nb.info/gnd/25694-8
- Neue Suche nach: Institute of Electrical and Electronics Engineers
- Weitere Informationen zu Institute of Electrical and Electronics Engineers:
- http://d-nb.info/gnd/1692-5
- Neue Suche nach: IEEE Computer Society, Test Technology Technical Council
- Weitere Informationen zu IEEE Computer Society, Test Technology Technical Council:
- http://d-nb.info/gnd/16030549-4
- Neue Suche nach: IEEE Computer Society
- Weitere Informationen zu IEEE Computer Society:
- http://d-nb.info/gnd/25694-8
2014
-
ISBN:
- Konferenzband / Elektronische Ressource
-
Titel:2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) : 6 - 7 May 2014, Arlington, VA, USA
-
Weitere Titelangaben:Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
-
Beteiligte:
-
Kongress:IEEE International Symposium on Hardware-Oriented Security and Trust ; 2014 ; Arlington, Va.
HOST ; 2014 ; Arlington, Va. -
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsort:Piscataway, NJ
-
Erscheinungsdatum:2014
-
Format / Umfang:Online-Ressource
-
Anmerkungen:"Part Number: CFP14HOA-CDR
Includes bibliographical references and author index -
ISBN:
-
Medientyp:Konferenzband
-
Format:Elektronische Ressource
-
Sprache:Englisch
- Neue Suche nach: 54.38
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
BKL: 54.38 Computersicherheit -
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Building trusted ICs using split fabricationVaidyanathan, Kaushik / Das, Bishnu P / Sumbul, Ekin / Liu, Renzhi / Pileggi, Larry et al. | 2014
- 7
-
Split-fabrication obfuscation: Metrics and techniquesJagasivamani, Meenatchi / Gadfort, Peter / Sika, Michel / Bajura, Michael / Fritze, Michael et al. | 2014
- 13
-
Efficient and secure intellectual property (IP) design with split fabricationVaidyanathan, Kaushik / Liu, Renzhi / Sumbul, Ekin / Zhu, Qiuling / Franchetti, Franz / Pileggi, Larry et al. | 2014
- 19
-
Verification of untrusted chips using trusted layout and emission measurementsStellari, Franco / Song, Peilin / Weger, Alan J. / Culp, Jim / Herbert, A. / Pfeiffer, D. et al. | 2014
- 25
-
Cryptographically secure shieldsCioranesco, Jean-Michel / Danger, Jean-Luc / Graba, Tarik / Guilley, Sylvain / Mathieu, Yves / Naccache, David / Ngo, Xuan Thuy et al. | 2014
- 32
-
Side-channel leakage on silicon substrate of CMOS cryptographic chipFujimoto, Daisuke / Tanaka, Daichi / Miura, Noriyuki / Nagata, Makoto / Hayashi, Yu-ichi / Homma, Naofumi / Bhasin, Shivam / Danger, Jean-Luc et al. | 2014
- 38
-
On design of a highly secure PUF based on non-linear current mirrorsKumar, Raghavan / Burleson, Wayne et al. | 2014
- 44
-
Entropy loss in PUF-based key generation schemes: The repetition code pitfallKoeberl, Patrick / Li, Jiangtao / Rajan, Anand / Wu, Wei et al. | 2014
- 50
-
Composite PUF: A new design paradigm for Physically Unclonable Functions on FPGASahoo, Durga Prasad / Saha, Sayandeep / Mukhopadhyay, Debdeep / Chakraborty, Rajat Subhra / Kapoor, Hitesh et al. | 2014
- 56
-
A look into SIMON from a side-channel perspectiveBhasin, Shivam / Graba, Tarik / Danger, Jean-Luc / Najm, Zakaria et al. | 2014
- 60
-
Increasing the efficiency of laser fault injections using fast gate level reverse engineeringCourbon, Franck / Loubet-Moundi, Philippe / Fournier, Jacques J.A. / Tria, Assia et al. | 2014
- 64
-
IP-level implementation of a resistance-based physical unclonable functionIsmari, Dylan / Plusquellic, Jim et al. | 2014
- 70
-
Security of SoC firmware load protocolsKrstic, Sava / Yang, Jin / Palmer, David W. / Osborne, Randy B. / Talmor, Eran et al. | 2014
- 76
-
A hierarchical formal approach to verifying side-channel resistant cryptographic processorsOkamoto, Kotaro / Homma, Naofumi / Aoki, Takafumi / Morioka, Sumio et al. | 2014
- 80
-
Optimality and beyond: The case of 4×4 S-boxesPicek, Stjepan / Ege, Baris / Papagiannopoulos, Kostas / Batina, Lejla / Jakobovic, Domagoj et al. | 2014
- 84
-
EM-based detection of hardware trojans on FPGAsSoll, Oliver / Korak, Thomas / Muehlberghuber, Michael / Hutter, Michael et al. | 2014
- 88
-
Robust keys from physical unclonable functionsSpain, Merrielle / Fuller, Benjamin / Ingols, Kyle / Cunningham, Robert et al. | 2014
- 93
-
Side-channel countermeasure for SHA-3 at almost-zero area overheadTaha, Mostafa / Schaumont, Patrick et al. | 2014
- 97
-
A frequency leakage model for SCATiran, S. / Ordas, S. / Teglia, Y. / Agoyan, M. / Maurine, P. et al. | 2014
- 101
-
Bit selection algorithm suitable for high-volume production of SRAM-PUFXiao, Kan / Rahman, Md. Tauhidur / Forte, Domenic / Huang, Yu / Su, Mei / Tehranipoor, Mohammad et al. | 2014
- 107
-
Hardware trojan detection by symmetry breaking in path delaysYoshimizu, Norimasa et al. | 2014
- 112
-
Experimental evaluation of two software countermeasures against fault attacksMoro, Nicolas / Heydemann, Karine / Dehbaoui, Amine / Robisson, Bruno / Encrenaz, Emmanuelle et al. | 2014
- 118
-
NREPO: Normal basis Recomputing with Permuted OperandsGuo, Xiaofei / Mukhopadhyay, Debdeep / Jin, Chenglu / Karri, Ramesh et al. | 2014
- 124
-
A noise bifurcation architecture for linear additive physical functionsYu, Meng-Day / M'Raihi, David / Verbauwhede, Ingrid / Devadas, Srinivas et al. | 2014
- 130
-
Analysis of the fault injection mechanism related to negative and positive power supply glitches using an on-chip voltmeterZussa, Loic / Dutertre, Jean-Max / Clediere, Jessy / Robisson, Bruno et al. | 2014
- 136
-
Power supply glitch attacks: Design and evaluation of detection circuitsGomina, Kamil / Rigaud, Jean-Baptiste / Gendrier, Philippe / Candelier, Philippe / Tria, Assia et al. | 2014
- 142
-
New scan attacks against state-of-the-art countermeasures and DFTAli, Sk Subidh / Sinanoglu, Ozgur / Saeed, Samah Mohamed / Karri, Ramesh et al. | 2014
- 148
-
Countering the effects of silicon aging on SRAM PUFsMaes, Roel / van der Leest, Vincent et al. | 2014
- 154
-
DWM-PUF: A low-overhead, memory-based security primitiveIyengar, Anirudh / Ramclam, Kenneth / Ghosh, Swaroop et al. | 2014
- 160
-
A Chaotic Ring oscillator based Random Number GeneratorDhanuskodi, Siva Nishok / Vijayakumar, Arunkumar / Kundu, Sandip et al. | 2014
- i
-
[Front matter]| 2014