Search dblp for Publications

export results for "toc:db/conf/host/host2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/host/AliSSK14,
  author       = {Sk Subidh Ali and
                  Ozgur Sinanoglu and
                  Samah Mohamed Saeed and
                  Ramesh Karri},
  title        = {New scan attacks against state-of-the-art countermeasures and {DFT}},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {142--147},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855585},
  doi          = {10.1109/HST.2014.6855585},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/AliSSK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BhasinGDN14,
  author       = {Shivam Bhasin and
                  Tarik Graba and
                  Jean{-}Luc Danger and
                  Zakaria Najm},
  title        = {A look into {SIMON} from a side-channel perspective},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {56--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855568},
  doi          = {10.1109/HST.2014.6855568},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BhasinGDN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/CioranescoDGGMNN14,
  author       = {Jean{-}Michel Cioranesco and
                  Jean{-}Luc Danger and
                  Tarik Graba and
                  Sylvain Guilley and
                  Yves Mathieu and
                  David Naccache and
                  Xuan Thuy Ngo},
  title        = {Cryptographically secure shields},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {25--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855563},
  doi          = {10.1109/HST.2014.6855563},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/CioranescoDGGMNN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/CourbonLFT14,
  author       = {Franck Courbon and
                  Philippe Loubet{-}Moundi and
                  Jacques J. A. Fournier and
                  Assia Tria},
  title        = {Increasing the efficiency of laser fault injections using fast gate
                  level reverse engineering},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {60--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855569},
  doi          = {10.1109/HST.2014.6855569},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/CourbonLFT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/DhanuskodiVK14,
  author       = {Siva Nishok Dhanuskodi and
                  Arunkumar Vijayakumar and
                  Sandip Kundu},
  title        = {A Chaotic Ring oscillator based Random Number Generator},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {160--165},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855588},
  doi          = {10.1109/HST.2014.6855588},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/DhanuskodiVK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/FujimotoTMNHHBD14,
  author       = {Daisuke Fujimoto and
                  Daichi Tanaka and
                  Noriyuki Miura and
                  Makoto Nagata and
                  Yu{-}ichi Hayashi and
                  Naofumi Homma and
                  Shivam Bhasin and
                  Jean{-}Luc Danger},
  title        = {Side-channel leakage on silicon substrate of {CMOS} cryptographic
                  chip},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {32--37},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855564},
  doi          = {10.1109/HST.2014.6855564},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/FujimotoTMNHHBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/GominaRGCT14,
  author       = {Kamil Gomina and
                  Jean{-}Baptiste Rigaud and
                  Philippe Gendrier and
                  Philippe Candelier and
                  Assia Tria},
  title        = {Power supply glitch attacks: Design and evaluation of detection circuits},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {136--141},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855584},
  doi          = {10.1109/HST.2014.6855584},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/GominaRGCT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/GuoMJK14,
  author       = {Xiaofei Guo and
                  Debdeep Mukhopadhyay and
                  Chenglu Jin and
                  Ramesh Karri},
  title        = {{NREPO:} Normal basis Recomputing with Permuted Operands},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {118--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855581},
  doi          = {10.1109/HST.2014.6855581},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/GuoMJK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/IsmariP14,
  author       = {Dylan Ismari and
                  Jim Plusquellic},
  title        = {IP-level implementation of a resistance-based physical unclonable
                  function},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {64--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855570},
  doi          = {10.1109/HST.2014.6855570},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/IsmariP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/IyengarRG14,
  author       = {Anirudh Iyengar and
                  Kenneth Ramclam and
                  Swaroop Ghosh},
  title        = {{DWM-PUF:} {A} low-overhead, memory-based security primitive},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {154--159},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855587},
  doi          = {10.1109/HST.2014.6855587},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/IyengarRG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/JagasivamaniGSBF14,
  author       = {Meenatchi Jagasivamani and
                  Peter Gadfort and
                  Michel Sika and
                  Michael Bajura and
                  Michael Fritze},
  title        = {Split-fabrication obfuscation: Metrics and techniques},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {7--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855560},
  doi          = {10.1109/HST.2014.6855560},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/JagasivamaniGSBF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/Koeberl0RW14,
  author       = {Patrick Koeberl and
                  Jiangtao Li and
                  Anand Rajan and
                  Wei Wu},
  title        = {Entropy loss in PUF-based key generation schemes: The repetition code
                  pitfall},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {44--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855566},
  doi          = {10.1109/HST.2014.6855566},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/Koeberl0RW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/KrsticYPOT14,
  author       = {Sava Krstic and
                  Jin Yang and
                  David W. Palmer and
                  Randy B. Osborne and
                  Eran Talmor},
  title        = {Security of SoC firmware load protocols},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {70--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855571},
  doi          = {10.1109/HST.2014.6855571},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/KrsticYPOT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/KumarB14,
  author       = {Raghavan Kumar and
                  Wayne P. Burleson},
  title        = {On design of a highly secure {PUF} based on non-linear current mirrors},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {38--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855565},
  doi          = {10.1109/HST.2014.6855565},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/KumarB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MaesL14,
  author       = {Roel Maes and
                  Vincent van der Leest},
  title        = {Countering the effects of silicon aging on {SRAM} PUFs},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {148--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855586},
  doi          = {10.1109/HST.2014.6855586},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MaesL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MoroHDRE14,
  author       = {Nicolas Moro and
                  Karine Heydemann and
                  Amine Dehbaoui and
                  Bruno Robisson and
                  Emmanuelle Encrenaz},
  title        = {Experimental evaluation of two software countermeasures against fault
                  attacks},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {112--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855580},
  doi          = {10.1109/HST.2014.6855580},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/MoroHDRE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/OkamotoHAM14,
  author       = {Kotaro Okamoto and
                  Naofumi Homma and
                  Takafumi Aoki and
                  Sumio Morioka},
  title        = {A hierarchical formal approach to verifying side-channel resistant
                  cryptographic processors},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {76--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855572},
  doi          = {10.1109/HST.2014.6855572},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/OkamotoHAM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/PicekEPBJ14,
  author       = {Stjepan Picek and
                  Baris Ege and
                  Kostas Papagiannopoulos and
                  Lejla Batina and
                  Domagoj Jakobovic},
  title        = {Optimality and beyond: The case of 4{\texttimes}4 S-boxes},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {80--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855573},
  doi          = {10.1109/HST.2014.6855573},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/PicekEPBJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/SahooSMCK14,
  author       = {Durga Prasad Sahoo and
                  Sayandeep Saha and
                  Debdeep Mukhopadhyay and
                  Rajat Subhra Chakraborty and
                  Hitesh Kapoor},
  title        = {Composite {PUF:} {A} new design paradigm for Physically Unclonable
                  Functions on {FPGA}},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {50--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855567},
  doi          = {10.1109/HST.2014.6855567},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/SahooSMCK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/SollKMH14,
  author       = {Oliver Soll and
                  Thomas Korak and
                  Michael Muehlberghuber and
                  Michael Hutter},
  title        = {EM-based detection of hardware trojans on FPGAs},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {84--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855574},
  doi          = {10.1109/HST.2014.6855574},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/SollKMH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/SpainFIC14,
  author       = {Merrielle Spain and
                  Benjamin Fuller and
                  Kyle Ingols and
                  Robert K. Cunningham},
  title        = {Robust keys from physical unclonable functions},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {88--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855575},
  doi          = {10.1109/HST.2014.6855575},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/SpainFIC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/StellariSWCHP14,
  author       = {Franco Stellari and
                  Peilin Song and
                  Alan J. Weger and
                  Jim Culp and
                  A. Herbert and
                  Dirk Pfeiffer},
  title        = {Verification of untrusted chips using trusted layout and emission
                  measurements},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {19--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855562},
  doi          = {10.1109/HST.2014.6855562},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/StellariSWCHP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/TahaS14,
  author       = {Mostafa M. I. Taha and
                  Patrick Schaumont},
  title        = {Side-channel countermeasure for {SHA-3} at almost-zero area overhead},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {93--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855576},
  doi          = {10.1109/HST.2014.6855576},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/TahaS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/TiranOTAM14,
  author       = {S{\'{e}}bastien Tiran and
                  S{\'{e}}bastien Ordas and
                  Yannick Teglia and
                  Michel Agoyan and
                  Philippe Maurine},
  title        = {A frequency leakage model for {SCA}},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {97--100},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855577},
  doi          = {10.1109/HST.2014.6855577},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/TiranOTAM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/VaidyanathanDSLP14,
  author       = {Kaushik Vaidyanathan and
                  Bishnu Prasad Das and
                  Huseyin Ekin Sumbul and
                  Renzhi Liu and
                  Larry T. Pileggi},
  title        = {Building trusted ICs using split fabrication},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855559},
  doi          = {10.1109/HST.2014.6855559},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/VaidyanathanDSLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/VaidyanathanLSZFP14,
  author       = {Kaushik Vaidyanathan and
                  Renzhi Liu and
                  Huseyin Ekin Sumbul and
                  Qiuling Zhu and
                  Franz Franchetti and
                  Larry T. Pileggi},
  title        = {Efficient and secure intellectual property {(IP)} design with split
                  fabrication},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {13--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855561},
  doi          = {10.1109/HST.2014.6855561},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/VaidyanathanLSZFP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/XiaoRF0ST14,
  author       = {Kan Xiao and
                  Md. Tauhidur Rahman and
                  Domenic Forte and
                  Yu Huang and
                  Mei Su and
                  Mohammad Tehranipoor},
  title        = {Bit selection algorithm suitable for high-volume production of {SRAM-PUF}},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {101--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855578},
  doi          = {10.1109/HST.2014.6855578},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/XiaoRF0ST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/Yoshimizu14,
  author       = {Norimasa Yoshimizu},
  title        = {Hardware trojan detection by symmetry breaking in path delays},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {107--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855579},
  doi          = {10.1109/HST.2014.6855579},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/Yoshimizu14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/YuMVD14,
  author       = {Meng{-}Day (Mandel) Yu and
                  David M'Ra{\"{\i}}hi and
                  Ingrid Verbauwhede and
                  Srinivas Devadas},
  title        = {A noise bifurcation architecture for linear additive physical functions},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {124--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855582},
  doi          = {10.1109/HST.2014.6855582},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/YuMVD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/ZussaDCR14,
  author       = {Lo{\"{\i}}c Zussa and
                  Jean{-}Max Dutertre and
                  Jessy Cl{\'{e}}di{\`{e}}re and
                  Bruno Robisson},
  title        = {Analysis of the fault injection mechanism related to negative and
                  positive power supply glitches using an on-chip voltmeter},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {130--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855583},
  doi          = {10.1109/HST.2014.6855583},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/ZussaDCR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/host/2014,
  title        = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6847848/proceeding},
  isbn         = {978-1-4799-4114-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics