


default search action
AsianHOST 2018: Hong Kong, China
- Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2018, Hong Kong, China, December 17-18, 2018. IEEE 2018, ISBN 978-1-5386-7471-0

- Love Kumar Sah, Sheikh Ariful Islam

, Srinivas Katkoori
:
An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow Attacks. 1-6 - Shalabh Jain, Qian Wang, Md Tanvir Arafin

, Jorge Guajardo:
Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks. 7-12 - Bo Ning, Qiang Liu:

Modeling and Efficiency Analysis of Clock Glitch Fault Injection Attack. 13-18 - Xiaofei Dong, Fan Zhang, Samiya Qureshi, Yiran Zhang, Ziyuan Liang, Bolin Yang, Feng Gao:

A Wavelet-based Power Analysis Attack against Random Delay Countermeasure. 19-24 - Horacio L. França, Charles B. Prado, Vinay C. Patil, Sandip Kundu:

Defeating Strong PUF Modeling Attack via Adverse Selection of Challenge-Response Pairs. 25-30 - Wenjie Li, Jing Ye, Xiaowei Li

, Huawei Li, Yu Hu:
Bias PUF based Secure Scan Chain Design. 31-36 - Zhonghao Liao, Yong Guan:

The Cell Dependency Analysis on Learning SRAM Power-Up States. 37-43 - K. A. Asha, Abhishek Patyal, Hung-Ming Chen:

Generation of PUF-Keys on FPGAs by K-means Frequency Clustering. 44-49 - Haihan Su, Jiliang Zhang:

Machine Learning Attacks on Voltage Over-scaling-based Lightweight Authentication. 50-55 - Prabuddha Chakraborty

, Jonathan Cruz, Swarup Bhunia
:
SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation. 56-61 - Mihailo Isakov, Lake Bu, Hai Cheng, Michel A. Kinsy:

Preventing Neural Network Model Exfiltration in Machine Learning Hardware Accelerators. 62-67 - Farhath Zareen

, Robert Karam:
Detecting RTL Trojans using Artificial Immune Systems and High Level Behavior Classification. 68-73 - Peng Gu, Dylan C. Stow, Prashansa Mukim, Shuangchen Li, Yuan Xie:

Cost-efficient 3D Integration to Hinder Reverse Engineering During and After Manufacturing. 74-79 - Rongjun Tan, Yuan Gao, Haixia He, Yuan Cao:

Secrecy Performance of Cognitive Radio Sensor Networks with an Energy-Harvesting based Eavesdropper and Imperfect CSI. 80-85 - Qian Wang, Yiming Qian, Zhaojun Lu, Yasser Shoukry

, Gang Qu:
A Delay based Plug-in-Monitor for Intrusion Detection in Controller Area Network. 86-91 - Muhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Vianney Lapotre

, Guy Gogniat
, Arnab Kumar Biswas
:
A novel lightweight hardware-assisted static instrumentation approach for ARM SoC using debug components. 92-97 - Qihang Shi, Huanyu Wang, Navid Asadizanjani, Mark Tehranipoor, Domenic Forte

:
A Comprehensive Analysis on Vulnerability of Active Shields to Tilted Microprobing Attacks. 98-103 - Mehmet Alp Sarkisla

, Salih Ergun
:
Ring Oscillator Based Random Number Generator Using Wake-up and Shut-down Uncertainties. 104-108 - Sheikh Ariful Islam

, Love Kumar Sah, Srinivas Katkoori
:
Empirical Word-Level Analysis of Arithmetic Module Architectures for Hardware Trojan Susceptibility. 109-114

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














