default search action
HOST 2022: McLean, VA, USA
- IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2022, McLean, VA, USA, June 27-30, 2022. IEEE 2022, ISBN 978-1-6654-8532-6
- Yashika Verma, Dixit Kumar, Biswabandan Panda:
EnclaveSim: A Micro-architectural Simulator with Enclave Support. 1-4 - Nils Wisiol:
Towards Attack Resilient Delay-Based Strong PUFs. 5-8 - Nitin Pundir, Henian Li, Lang Lin, Norman Chang, Farimah Farahmandi, Mark M. Tehranipoor:
Security Properties Driven Pre-Silicon Laser Fault Injection Assessment. 9-12 - Kimia Zamiri Azar, Hadi Mardani Kamali, Farimah Farahmandi, Mark M. Tehranipoor:
Warm Up before Circuit De-obfuscation? An Exploration through Bounded-Model-Checkers. 13-16 - Lang Lin, Jimin Wen, Harsh Shrivastav, Weike Li, Hua Chen, Gang Ni, Sreeja Chowdhury, Calvin Chow, Norman Chang:
Layout-level Vulnerability Ranking from Electromagnetic Fault Injection. 17-20 - Gourav Takhar, Subhajit Roy:
Structural Analysis Attack on Sequential Circuit Logic Locking. 21-24 - Daniel Canaday, Wendson A. S. Barbosa, Andrew Pomerance:
A Novel Attack on Machine-Learning Resistant Physical Unclonable Functions. 25-28 - Siam Haque, Shahnam Mirzaei:
System on Chip (SoC) Security Architecture Framework for Isolated Domains Against Threats. 29-32 - Sandeep Sunkavilli, Qiaoyan Yu:
Security Threats and Countermeasure Deployment Using Partial Reconfiguration in FPGA CAD Tools. 33-36 - Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Yongshan Ding, Jakub Szefer:
Towards an Antivirus for Quantum Computers. 37-40 - Ayman Hroub, Muhammad E. S. Elrabaa:
SecSoC: A Secure System on Chip Architecture for IoT Devices. 41-44 - Saikat Majumdar, Mohammad Hossein Samavatian, Radu Teodorescu:
Characterizing Side-Channel Leakage of DNN Classifiers though Performance Counters. 45-48 - Ankit Mittal, Aatmesh Shrivastava:
Detecting Continuous Jamming Attack using Ultra-low Power RSSI Circuit. 49-52 - Ruben Purdy, Danielle Duvalsaint, R. D. Shawn Blanton:
Secuirty Metrics for Logic Circuits. 53-56 - Tarun Solanki, Biswabandan Panda:
SpecPref: High Performing Speculative Attacks Resilient Hardware Prefetchers. 57-60 - Elmira Moussavi, Dominik Sisejkovic, Fabian Brings, Daniyar Kizatov, Animesh Singh, Xuan Thang Vu, Rainer Leupers, Sven Ingebrandt, Vivek Pachauri, Farhad Merchant:
pHGen: A pH-Based Key Generation Mechanism Using ISFETs. 61-64 - Timothy Radtke, Cristinel Ababei:
Safeguarding Unmanned Aerial Vehicles Against Side Channel Analysis Via Motor Noise Injection. 65-68 - Markku-Juhani O. Saarinen:
WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography. 69-72 - Yadi Zhong, Ujjwal Guin:
Chosen-Plaintext Attack on Energy-Efficient Hardware Implementation of GIFT-COFB. 73-76 - Tsion Yimer, Edmund Smith, Paige Harvey, Marcial Tienteu, Kevin T. Kornegay:
Error Correction Attacks on BACnet MS/TP. 77-80 - Gaëtan Leplus, Olivier Savry, Lilian Bossuet:
Insertion of random delay with context-aware dummy instructions generator in a RISC-V processor. 81-84 - Duhyun Jeon, Dongmin Lee, Dong Kyue Kim, Byong-Deok Choi:
Contact PUF: Highly Stable Physical Unclonable Functions Based on Contact Failure Probability in 180 nm, 130 nm, and 28 nm CMOS Processes. 85-88 - Arman Roohi, Shaahin Angizi:
Efficient Targeted Bit-Flip Attack Against the Local Binary Pattern Network. 89-92 - Mila Anastasova, Mojtaba Bisheh-Niasar, Hwajeong Seo, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Efficient and Side-Channel Resistant Design of High-Security Ed448 on ARM Cortex-M4. 93-96 - Mohammad Ebrahimabadi, Suhee Sanjana Mehjabin, Raphael Viera, Sylvain Guilley, Jean-Luc Danger, Jean-Max Dutertre, Naghmeh Karimi:
Detecting Laser Fault Injection Attacks via Time-to-Digital Converter Sensors. 97-100 - Nafis Irtija, Eirini-Eleni Tsiropoulou, Cyrus Minwalla, Jim Plusquellic:
True Random Number Generation with the Shift-register Reconvergent-Fanout (SiRF) PUF. 101-104 - Jakub Slowik, Gregory Williams, Rummah Albashir, Anthony Samagio, Geraldine Shirley Nicholas, Fareena Saqib:
Dynamic Key Updates for LUT Locked Design. 105-108 - Shajib Ghosh, Mohammad Tahsin Mostafiz, Suprith Gurudu, Shayan Taheri, Navid Asadizanjani:
PCB Component Detection for Hardware Assurance: A Feature Selection-based Approach. 109-112 - Sujan Kumar Saha, Joel Mandebi Mbongue, Christophe Bobda:
Metrics for Assessing Security of System-on-Chip. 113-116 - Md Rafid Muttaki, Tao Zhang, Mark M. Tehranipoor, Farimah Farahmandi:
FTC: A Universal Sensor for Fault Injection Attack Detection. 117-120 - Lingjuan Wu, Xuelin Zhang, Siyi Wang, Wei Hu:
Hardware Trojan Detection at LUT: Where Structural Features Meet Behavioral Characteristics. 121-124 - Anita Aghaie, Amir Moradi, Johannes Tobisch, Nils Wisiol:
Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines. 125-128 - Noeloikeau F. Charlot, Daniel J. Gauthier, Daniel Canaday, Andrew Pomerance:
Mathematical Model of Strong Physically Unclonable Functions Based on Hybrid Boolean Networks. 129-132 - Kunbei Cai, Zhenkai Zhang, Fan Yao:
On the Feasibility of Training-time Trojan Attacks through Hardware-based Faults in Memory. 133-136 - Reshmi Suragani, Emiliia Nazarenko, Nikolaos Athanasios Anagnostopoulos, Nico Mexis, Elif Bilge Kavun:
Identification and Classification of Corrupted PUF Responses via Machine Learning. 137-140 - Tolulope A. Odetola, Adewale Adeyemo, Syed Rafay Hasan:
Hardening Hardware Accelerartor Based CNN Inference Phase Against Adversarial Noises. 141-144 - Amin Rezaei, Ava Hedayatipour, Hossein Sayadi, Mehrdad Aliasgari, Hai Zhou:
Global Attack and Remedy on IC-Specific Logic Encryption. 145-148 - Yohannes Belayneh Bekele, Daniel B. Limbrick:
Evaluating the Impact of Hardware Faults on Program Execution in a Microkernel Environment. 149-152 - Vaibhav Venugopal Rao, Kyle Juretus, Ioannis Savidis:
Practical Performance of Analog Attack Techniques. 153-156 - Tianyou Bao, Pengzhou He, Jiafeng Xie:
Systolic Acceleration of Polynomial Multiplication for KEM Saber and Binary Ring-LWE Post-Quantum Cryptography. 157-160 - Saeed Abdolinezhad, Axel Sikora:
A Lightweight Mutual Authentication Protocol Based on Physical Unclonable Functions. 161-164 - Mahmoud AbdelHafeez, Mostafa Taha:
Oblivious Intrusion Detection System. 165-168 - Yun Liu, Yongliang Chen, Xiaole Cui:
A Modeling Attack on the Sub-threshold Current Array PUF. 169-172 - Ying Li, Lan Chen, Jian Wang, Guanfei Gong:
Partial Reconfiguration for Run-time Memory Faults and Hardware Trojan Attacks Detection. 173-176 - Dipanjan Roy, Sabiya Jani Shaik, Sonam Sharma:
Securing Hardware Accelerator during High-level Synthesis. 177-180 - Ying Zhang, Yuanxiang Li, Xin Chen, Jizhong Yang, Yifeng Hua, Jiaoyan Yao:
PUF-based Secure Test Wrapper Design for Network-on-Chip. 181-184
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.