default search action
Journal of Hardware and Systems Security, Volume 2
Volume 2, Number 1, March 2018
- Muluken Hailesellasie, Syed Rafay Hasan:
Intrusion Detection in PLC-Based Industrial Control Systems Using Formal Verification Approach in Conjunction with Graphs. 1-14 - Md. Mahbub Alam, Sreeja Chowdhury, Beomsoo Park, David Joseph Munzer, Nima Maghari, Mark M. Tehranipoor, Domenic Forte:
Challenges and Opportunities in Analog and Mixed Signal (AMS) Integrated Circuit (IC) Security. 15-32 - Yangdi Lyu, Prabhat Mishra:
A Survey of Side-Channel Attacks on Caches and Countermeasures. 33-50 - Sujit Rokka Chhetri, Sina Faezi, Nafiul Rashid, Mohammad Abdullah Al Faruque:
Manufacturing Supply Chain and Product Lifecycle Security in the Era of Industry 4.0. 51-68 - Chao Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding, Pei Luo, Saoni Mukherjee, David R. Kaeli:
Power Analysis Attack of an AES GPU Implementation. 69-82 - Arash Nejat, David Hély, Vincent Beroulle:
ESCALATION: Leveraging Logic Masking to Facilitate Path-Delay-Based Hardware Trojan Detection Methods. 83-96
Volume 2, Number 2, June 2018
- Kejun Chen, Shuai Zhang, Zhikun Li, Yi Zhang, Qingxu Deng, Sandip Ray, Yier Jin:
Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice. 97-110 - Bilgiday Yuce, Patrick Schaumont, Marc Witteman:
Fault Attacks on Secure Embedded Software: Threats, Design, and Evaluation. 111-130 - Vivek Venugopalan, Cameron D. Patterson:
Surveying the Hardware Trojan Threat Landscape for the Internet-of-Things. 131-141 - Sarah Amir, Bicky Shakya, Xiaolin Xu, Yier Jin, Swarup Bhunia, Mark M. Tehranipoor, Domenic Forte:
Development and Evaluation of Hardware Obfuscation Benchmarks. 142-161 - Debapriya Basu Roy, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Wei He, Debdeep Mukhopadhyay, Zakaria Najm, Xuan Thuy Ngo:
The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA. 162-178 - Sparsh Mittal, Ahmed Izzat Alsalibi:
A Survey of Techniques for Improving Security of Non-volatile Memories. 179-200
Volume 2, Number 3, September 2018
- Travis Meade, Kaveh Shamsi, Thao Le, Jia Di, Shaojie Zhang, Yier Jin:
The Old Frontier of Reverse Engineering: Netlist Partitioning. 201-213 - Shahrzad Keshavarz, Cunxi Yu, Samaneh Ghandali, Xiaolin Xu, Daniel E. Holcomb:
Survey on Applications of Formal Methods in Reverse Engineering and Intellectual Property Protection. 214-224 - Vidya Govindan, Rajat Subhra Chakraborty, Pranesh Santikellur, Aditya Kumar Chaudhary:
A Hardware Trojan Attack on FPGA-Based Cryptographic Key Generation: Impact and Detection. 225-239 - Preston D. Frazier, E. Thomas Gilmore, Isaac J. Collins, Wardell E. Samotshozo, Mohamed F. Chouikha:
A Novel Counterfeit Detection Approach for Integrated Circuit Supply Chain Assurance. 240-250 - Taimour Wehbe, Vincent John Mooney, Omer T. Inan, David C. Keezer:
Securing Medical Devices Against Hardware Trojan Attacks Through Analog-, Digital-, and Physiological-Based Signatures. 251-265 - Sparsh Mittal, S. B. Abhinaya, Manish Reddy, Irfan Ali:
A Survey of Techniques for Improving Security of GPUs. 266-285
Volume 2, Number 4, December 2018
- Domenic Forte, Yousef Iskander:
Guest Editorial: Hardware Reverse Engineering and Obfuscation. 287-288 - Johannes Obermaier, Vincent Immler:
The Past, Present, and Future of Physical Security Enclosures: From Battery-Backed Monitoring to PUF-Based Inherent Security and Beyond. 289-296 - Pascal Sasdrich, Tim Güneysu:
Exploring RFC 7748 for Hardware Implementation: Curve25519 and Curve448 with Side-Channel Protection. 297-313 - Sergei Skorobogatov:
Hardware Security Implications of Reliability, Remanence, and Recovery in Embedded Memory. 314-321 - Raul Quijada, Roger Dura, Jofre Pallares, Xavier Formatje, Salvador Hidalgo, Francisco Serra-Graells:
Large-Area Automated Layout Extraction Methodology for Full-IC Reverse Engineering. 322-332 - Nidish Vashistha, M. Tanjidur Rahman, Hao-Ting Shen, Damon L. Woodard, Navid Asadizanjani, Mark M. Tehranipoor:
Detecting Hardware Trojans Inserted by Untrusted Foundry Using Physical Inspection and Advanced Image Processing. 333-344 - Elham Amini, Anne Beyreuther, Norbert Herfurth, Alexander Steigert, Bernd Szyszka, Christian Boit:
Assessment of a Chip Backside Protection. 345-352
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.