


Остановите войну!
for scientists:


default search action
Journal of Hardware and Systems Security, Volume 3
Volume 3, Number 1, March 2019
- Sk Subidh Ali
, Debdeep Mukhopadhyay:
Guest Editorial SPACE 2017 Special Issue in the Journal of Hardware and Systems Security (HaSS). 1-2 - Donghoon Chang, Mohona Ghosh, Arpan Jati, Abhishek Kumar
, Somitra Kumar Sanadhya:
A Generalized Format Preserving Encryption Framework Using MDS Matrices. 3-11 - Vishal Saraswat
, Rajeev Anand Sahu, Gaurav Sharma, Veronika Kuchta
, Olivier Markowitch:
Public-Key Encryption with Integrated Keyword Search. 12-25 - Manaar Alam
, Sarani Bhattacharya, Sayan Sinha, Chester Rebeiro, Debdeep Mukhopadhyay:
IPA: an Instruction Profiling-Based Micro-architectural Side-Channel Attack on Block Ciphers. 26-44 - Efthimios Alepis, Constantinos Patsakis
:
Unravelling Security Issues of Runtime Permissions in Android. 45-63 - Akhilesh Anilkumar Siddhanti
, Subhamoy Maitra, Nishant Sinha:
Certain Observations on ACORN v3 and Grain v1 - Implications Towards TMDTO Attacks. 64-77 - Vincent Immler
, Matthias Hiller
, Qinzhi Liu, Andreas Lenz, Antonia Wachter-Zeh:
Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs - Extended Version. 78-93 - Bhagwan N. Bathe
, Bharti Hariramani, A. K. Bhattacharjee, S. V. Kulgod:
Analysis of Diagonal Constants for Extension of Salsa to 64 Bit. 94-102
Volume 3, Number 2, June 2019
- Sikhar Patranabis
, Debapriya Basu Roy, Anirban Chakraborty, Naveen Nagar, Astikey Singh, Debdeep Mukhopadhyay, Santosh Ghosh:
Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications. 103-131 - Charalambos Konstantinou
, Michail Maniatakos:
Hardware-Layer Intelligence Collection for Smart Grid Embedded Systems. 132-146 - Himanshi Jain
, D. Anthony Balaraju, Chester Rebeiro:
Spy Cartel: Parallelizing Evict+Time-Based Cache Attacks on Last-Level Caches. 147-163 - Hossein Abbasi
, Naser Ezzati-Jivan, Martine Bellaïche, Chamseddine Talhi, Michel R. Dagenais:
Machine Learning-Based EDoS Attack Detection Technique Using Execution Trace Analysis. 164-176 - Rajesh J. S.
, Chidhambaranathan Rajamanikkam, Koushik Chakraborty, Sanghamitra Roy:
Securing Data Center Against Power Attacks. 177-188 - Jason R. Hamlet, Jackson R. Mayo, Vivian Kammler:
Targeted modification of hardware trojans. 189-197
Volume 3, Number 3, September 2019
- Michael Vai, Yunsi Fei, Roger Khazan:
Guest Editorial: Special Issue on Hardware Solutions for Cyber Security. 199 - Lake Bu
, Jaya Dofe, Qiaoyan Yu, Michel A. Kinsy:
SRASA: a Generalized Theoretical Framework for Security and Reliability Analysis in Computing Systems. 200-218 - Jakub Szefer
:
Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses. 219-234 - Leandro Santiago de Araújo
, Vinay C. Patil
, Charles B. Prado, Tiago A. O. Alves, Leandro A. J. Marzulo, Felipe M. G. França
, Sandip Kundu:
Design of Robust, High-Entropy Strong PUFs via Weightless Neural Network. 235-249
- Pallabi Ghosh, Aritra Bhattacharya, Domenic Forte, Rajat Subhra Chakraborty
:
Automated Defective Pin Detection for Recycled Microelectronics Identification. 250-260 - James Chacko, Kyle Juretus
, Marko Jacovic, Cem Sahin, Nagarajan Kandasamy, Ioannis Savidis, Kapil R. Dandekar:
Securing Wireless Communication via Hardware-Based Packet Obfuscation. 261-272 - Mosabbah Mushir Ahmed
, David Hély, Etienne Perret, Nicolas Barbot, Romain Siragusa, Maxime Bernier, Frédéric Garet:
Robust and Noninvasive IC Authentication Using Radiated Electromagnetic Emissions. 273-288 - Constantinos Patsakis
, Kleanthis Dellios, José María de Fuentes, Fran Casino, Agusti Solanas:
External Monitoring Changes in Vehicle Hardware Profiles: Enhancing Automotive Cyber-Security. 289-303
Volume 3, Number 4, December 2019
- Haider Adnan Khan
, Nader Sehatbakhsh
, Luong N. Nguyen, Milos Prvulovic, Alenka G. Zajic:
Malware Detection in Embedded Systems Using Neural Network Model for Electromagnetic Side-Channel Signals. 305-318 - Prathap Siddavaatam, Reza Sedaghat:
A New Adaptive Security Architecture with Extensible Computation Complexity for Generic Ciphers. 319-337 - Pinchen Cui
, Ujjwal Guin, Anthony Skjellum, David A. Umphress:
Blockchain in IoT: Current Trends, Challenges, and Future Roadmap. 338-364 - Abderrahmane Sensaoui, Oum-El-Kheir Aktouf, David Hély, Stephane Di Vito:
An In-depth Study of MPU-Based Isolation Techniques. 365-381 - Ioannis Karageorgos
, Mehmet Meric Isgenc, Samuel Pagliarini, Lawrence T. Pileggi:
Chip-to-Chip Authentication Method Based on SRAM PUF and Public Key Cryptography. 382-396 - Shuwen Deng
, Wenjie Xiong
, Jakub Szefer
:
Analysis of Secure Caches Using a Three-Step Model for Timing-Based Attacks. 397-425 - James Shey
, Naghmeh Karimi, Ryan W. Robucci, Chintan Patel:
Implementation-Based Design Fingerprinting for Robust IC Fraud Detection. 426-439

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.