


default search action
HOST 2009: San Francisco, CA, USA
- Mohammad Tehranipoor, Jim Plusquellic:

IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2009, San Francisco, CA, USA, July 27, 2009. Proceedings. IEEE Computer Society 2009, ISBN 978-1-4244-4805-0
Session 1: Attacks
- Sergei P. Skorobogatov:

Local Heating Attacks on Flash Memory Devices. 1-6 - Guilhem Castagnos, Alexandre Berzati, Cécile Canovas

, Blandine Debraize, Louis Goubin, Aline Gouget, Pascal Paillier, Stephanie Salgado:
Fault Analysis of Grain-128. 7-14 - Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Nidhal Selmane:

Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs. 15-21
Session 2: Physical Unclonable Functions
- Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schellekens, Boris Skoric, Pim Tuyls:

Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage. 22-29 - Vignesh Vivekraja, Leyla Nazhandali:

Circuit Level Techniques for Reliable Physically Uncloneable Functions. 30-35 - Gang Qu:

Temperature-Aware Cooperative Ring Oscillator PUF. 36-42
Session 4: Hardware Trojans
- Andrea Candore, Övünç Kocabas, Farinaz Koushanfar

:
Robust Stable Radiometric Fingerprinting for Frequency Reconfigurable Devices. 43-49 - Yier Jin

, Nathan Kupp, Yiorgos Makris
:
Experiences in Hardware Trojan Design and Implementation. 50-57 - Devendra Rai, John C. Lach:

Performance of Delay-Based Trojan Detection Techniques under Parameter Variations. 58-65 - Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic:

New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time. 66-73
Session 5: IP Protection and CAD Tools for Security
- Roel Maes

, Dries Schellekens, Pim Tuyls, Ingrid Verbauwhede
:
Analysis and Design of Active IC Metering Schemes. 74-81 - Jorge Guajardo, Tim Güneysu

, Sandeep S. Kumar, Christof Paar:
Secure IP-Block Distribution for Hardware Devices. 82-89 - Zhimin Chen, Patrick Schaumont

:
Extended Abstract: Early Feedback on Side-Channel Risks with Accelerated Toggle-Counting. 90-95
Session 6: Poster Session
- Rajat Subhra Chakraborty, Swarup Bhunia

:
Security Through Obscurity: An Approach for Protecting Register Transfer Level Hardware IP. 96-99 - Gedare Bloom, Bhagirath Narahari, Rahul Simha:

OS Support for Detecting Trojan Circuit Attacks. 100-103 - Mainak Banga, Michael S. Hsiao:

VITAMIN: Voltage Inversion Technique to Ascertain Malicious Insertions in ICs. 104-107 - David R. McIntyre, Francis G. Wolff, Christos A. Papachristou

, Swarup Bhunia
:
Dynamic Evaluation of Hardware Trust. 108-111

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














