Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/ivsw:"
@inproceedings{DBLP:conf/ivsw/DuKZBSESSP19, author = {Nan Du and Mahdi Kiani and Xianyue Zhao and Danilo B{\"{u}}rger and Oliver G. Schmidt and Ramona Ecke and Stefan E. Schulz and Heidemarie Schmidt and Ilia Polian}, title = {Electroforming-free Memristors for Hardware Security Primitives}, booktitle = {4th {IEEE} International Verification and Security Workshop, {IVSW} 2019, Rhodes Island, Greece, July 1-3, 2019}, pages = {67--70}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IVSW.2019.8854394}, doi = {10.1109/IVSW.2019.8854394}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/DuKZBSESSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/KarpAK19, author = {Batya Karp and Ofer Amrani and Osnat Keren}, title = {Nonlinear Product Codes for Reliability and Security}, booktitle = {4th {IEEE} International Verification and Security Workshop, {IVSW} 2019, Rhodes Island, Greece, July 1-3, 2019}, pages = {13--18}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IVSW.2019.8854455}, doi = {10.1109/IVSW.2019.8854455}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/KarpAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/KazemiPSAAHB19, author = {Zahra Kazemi and Athanasios Papadimitriou and Ioanna Souvatzoglou and Ehsan Aerabi and Mosabbah Mushir Ahmed and David H{\'{e}}ly and Vincent Beroulle}, title = {On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems: Clock Glitch Attacks}, booktitle = {4th {IEEE} International Verification and Security Workshop, {IVSW} 2019, Rhodes Island, Greece, July 1-3, 2019}, pages = {7--12}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IVSW.2019.8854391}, doi = {10.1109/IVSW.2019.8854391}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/KazemiPSAAHB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/MartinVNK19, author = {Honorio Mart{\'{\i}}n and Elena Ioana Vatajelu and Giorgio Di Natale and Osnat Keren}, title = {On the Reliability of the Ring Oscillator Physically Unclonable Functions}, booktitle = {4th {IEEE} International Verification and Security Workshop, {IVSW} 2019, Rhodes Island, Greece, July 1-3, 2019}, pages = {25--30}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IVSW.2019.8854401}, doi = {10.1109/IVSW.2019.8854401}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/MartinVNK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/MerandatRVQVMLF19, author = {Marc Merandat and Vincent Reynaud and Emanuele Valea and J{\'{e}}r{\^{o}}me Qu{\'{e}}vremont and Nicolas Valette and Paolo Maistri and R{\'{e}}gis Leveugle and Marie{-}Lise Flottes and Sophie Dupuis and Bruno Rouzeyre and Giorgio Di Natale}, title = {A Comprehensive Approach to a Trusted Test Infrastructure}, booktitle = {4th {IEEE} International Verification and Security Workshop, {IVSW} 2019, Rhodes Island, Greece, July 1-3, 2019}, pages = {43--48}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IVSW.2019.8854428}, doi = {10.1109/IVSW.2019.8854428}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/MerandatRVQVMLF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/NejatKBHF19, author = {Arash Nejat and Zahra Kazemi and Vincent Beroulle and David H{\'{e}}ly and Mahdi Fazeli}, title = {Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection}, booktitle = {4th {IEEE} International Verification and Security Workshop, {IVSW} 2019, Rhodes Island, Greece, July 1-3, 2019}, pages = {49--54}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IVSW.2019.8854402}, doi = {10.1109/IVSW.2019.8854402}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ivsw/NejatKBHF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/SiddiquiSBBPS19, author = {Ali Shuja Siddiqui and Geraldine Shirley and Shreya Bendre and Girija Bhagwat and Jim Plusquellic and Fareena Saqib}, title = {Secure Design Flow of {FPGA} Based {RISC-V} Implementation}, booktitle = {4th {IEEE} International Verification and Security Workshop, {IVSW} 2019, Rhodes Island, Greece, July 1-3, 2019}, pages = {37--42}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IVSW.2019.8854418}, doi = {10.1109/IVSW.2019.8854418}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/SiddiquiSBBPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/SinglaLG19, author = {Aayush Singla and Bernhard Lippmann and Helmut Graeb}, title = {Verification of Physical Chip Layouts Using {GDSII} Design Data}, booktitle = {4th {IEEE} International Verification and Security Workshop, {IVSW} 2019, Rhodes Island, Greece, July 1-3, 2019}, pages = {55--60}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IVSW.2019.8854432}, doi = {10.1109/IVSW.2019.8854432}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/SinglaLG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/SuHZ19, author = {Haibo Su and Basel Halak and Mark Zwolinski}, title = {Two-Stage Architectures for Resilient Lightweight PUFs}, booktitle = {4th {IEEE} International Verification and Security Workshop, {IVSW} 2019, Rhodes Island, Greece, July 1-3, 2019}, pages = {19--24}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IVSW.2019.8854400}, doi = {10.1109/IVSW.2019.8854400}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/SuHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/TakakisMND19, author = {Zacharias Takakis and Dimitrios Mangiras and Chrysostomos Nicopoulos and Giorgos Dimitrakopoulos}, title = {Dynamic Adjustment of Test-Sequence Duration for Increasing the Functional Coverage}, booktitle = {4th {IEEE} International Verification and Security Workshop, {IVSW} 2019, Rhodes Island, Greece, July 1-3, 2019}, pages = {61--66}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IVSW.2019.8854389}, doi = {10.1109/IVSW.2019.8854389}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ivsw/TakakisMND19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/YilmazH19, author = {Yildiran Yilmaz and Basel Halak}, title = {A Two-Flights Mutual Authentication for Energy-Constrained IoT Devices}, booktitle = {4th {IEEE} International Verification and Security Workshop, {IVSW} 2019, Rhodes Island, Greece, July 1-3, 2019}, pages = {31--36}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IVSW.2019.8854438}, doi = {10.1109/IVSW.2019.8854438}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/YilmazH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/YuHZ19, author = {Miao Yu and Basel Halak and Mark Zwolinski}, title = {Using Hardware Performance Counters to Detect Control Hijacking Attacks}, booktitle = {4th {IEEE} International Verification and Security Workshop, {IVSW} 2019, Rhodes Island, Greece, July 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IVSW.2019.8854399}, doi = {10.1109/IVSW.2019.8854399}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ivsw/YuHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ivsw/2019, title = {4th {IEEE} International Verification and Security Workshop, {IVSW} 2019, Rhodes Island, Greece, July 1-3, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8850848/proceeding}, isbn = {978-1-7281-2671-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/AhmedHPBSBG18, author = {Mosabbah Mushir Ahmed and David H{\'{e}}ly and Etienne Perret and Nicolas Barbot and Romain Siragusa and Maxime Bernier and Fr{\'{e}}d{\'{e}}ric Garet}, title = {Authentication of Microcontroller Board Using Non-Invasive {EM} Emission Technique}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {25--30}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494883}, doi = {10.1109/IVSW.2018.8494883}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/AhmedHPBSBG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/BarenghiBIP18, author = {Alessandro Barenghi and Luca Breveglieri and Niccol{\`{o}} Izzo and Gerardo Pelosi}, title = {Software-only Reverse Engineering of Physical {DRAM} Mappings for Rowhammer Attacks}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {19--24}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494868}, doi = {10.1109/IVSW.2018.8494868}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/BarenghiBIP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/Drechsler18, author = {Rolf Drechsler}, title = {Keynotes: Towards Self-Explaining Digital Systems: {A} Design Methodology for the Next Generation}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {i--iii}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494895}, doi = {10.1109/IVSW.2018.8494895}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/Drechsler18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/DrechslerLFG18, author = {Rolf Drechsler and Christoph L{\"{u}}th and G{\"{o}}rschwin Fey and Tim G{\"{u}}neysu}, title = {Towards Self-Explaining Digital Systems: {A} Design Methodology for the Next Generation}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494900}, doi = {10.1109/IVSW.2018.8494900}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ivsw/DrechslerLFG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/ElhamsharyIE18, author = {Amira Elhamshary and Yehea Ismail and Said Elkhamy}, title = {Security Analysis of Chaotic Baker Maps}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {44--47}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494880}, doi = {10.1109/IVSW.2018.8494880}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/ElhamsharyIE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/FaconGLSS18, author = {Adrien Facon and Sylvain Guilley and Matthieu Lec'Hvien and Alexander Schaub and Youssef Souissi}, title = {Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {7--12}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494855}, doi = {10.1109/IVSW.2018.8494855}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ivsw/FaconGLSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/HastingsJGH18, author = {Adam Hastings and Sean Jensen and Jeffrey Goeders and Brad L. Hutchings}, title = {Using Physical and Functional Comparisons to Assure 3rd-Party {IP} for Modern FPGAs}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {80--86}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494874}, doi = {10.1109/IVSW.2018.8494874}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/HastingsJGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/KazemiPHFB18, author = {Zahra Kazemi and Athanasios Papadimitriou and David H{\'{e}}ly and Mahdi Fazeli and Vincent Beroulle}, title = {Hardware Security Evaluation Platform for MCU-Based Connected Devices: Application to Healthcare IoT}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {87--92}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494843}, doi = {10.1109/IVSW.2018.8494843}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/KazemiPHFB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/LeWDZJ18, author = {Thao Le and Lucas Weaver and Jia Di and Shaojie Zhang and Yier Jin}, title = {Hardware Trojan Detection and Functionality Determination for Soft IPs}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {56--61}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494891}, doi = {10.1109/IVSW.2018.8494891}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/LeWDZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/MahmudOK18, author = {Shakil Mahmud and Brooks Olney and Robert Karam}, title = {Architectural Diversity: Bio-Inspired Hardware Security for FPGAs}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {48--51}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494854}, doi = {10.1109/IVSW.2018.8494854}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/MahmudOK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/Marcelli0SS18, author = {Andrea Marcelli and Ernesto S{\'{a}}nchez and Luca Sasselli and Giovanni Squillero}, title = {On the Mitigation of Hardware Trojan Attacks in Embedded Processors by Exploiting a Hardware-Based Obfuscator}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {31--37}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494850}, doi = {10.1109/IVSW.2018.8494850}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/Marcelli0SS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/QinHMT18, author = {Maoyuan Qin and Wei Hu and Dejun Mu and Yu Tai}, title = {Property Based Formal Security Verification for Hardware Trojan Detection}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {62--67}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494858}, doi = {10.1109/IVSW.2018.8494858}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/QinHMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/RahmanSTSWTA18, author = {M. Tanjidur Rahman and Qihang Shi and Shahin Tajik and Hao{-}Ting Shen and Damon L. Woodard and Mark M. Tehranipoor and Navid Asadizanjani}, title = {Physical Inspection {\&} Attacks: New Frontier in Hardware Security}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {93--102}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494856}, doi = {10.1109/IVSW.2018.8494856}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ivsw/RahmanSTSWTA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/SilvaVFDNR18, author = {Mathieu Da Silva and Emanuele Valea and Marie{-}Lise Flottes and Sophie Dupuis and Giorgio Di Natale and Bruno Rouzeyre}, title = {A New Secure Stream Cipher for Scan Chain Encryption}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {68--73}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494852}, doi = {10.1109/IVSW.2018.8494852}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/SilvaVFDNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/SuZH18, author = {Haibo Su and Mark Zwolinski and Basel Halak}, title = {A Machine Learning Attacks Resistant Two Stage Physical Unclonable Functions Design}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {52--55}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494839}, doi = {10.1109/IVSW.2018.8494839}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/SuZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/TakarabtCFGMSS18, author = {Sofiane Takarabt and Kais Chibani and Adrien Facon and Sylvain Guilley and Yves Mathieu and Laurent Sauvage and Youssef Souissi}, title = {Pre-silicon Embedded System Evaluation as New {EDA} Tool for Security Verification}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {74--79}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494881}, doi = {10.1109/IVSW.2018.8494881}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/TakarabtCFGMSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/WernerLBG18, author = {Michael Werner and Bernhard Lippmann and Johanna Baehr and Helmut Gr{\"{a}}b}, title = {Reverse Engineering of Cryptographic Cores by Structural Interpretation Through Graph Analysis}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {13--18}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494896}, doi = {10.1109/IVSW.2018.8494896}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/WernerLBG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/YilmazGH18, author = {Yildiran Yilmaz and Steve R. Gunn and Basel Halak}, title = {Lightweight PUF-Based Authentication Protocol for IoT Devices}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {38--43}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494884}, doi = {10.1109/IVSW.2018.8494884}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/YilmazGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ivsw/2018, title = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8482238/proceeding}, isbn = {978-1-5386-6544-2}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/AftabjahaniD17, author = {Seyed{-}Abdollah Aftabjahani and Amitabh Das}, title = {Robust secure design by increasing the resilience of Attack Protection Blocks}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {13--18}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031538}, doi = {10.1109/IVSW.2017.8031538}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/AftabjahaniD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/BerryhillVVP17, author = {Ryan Berryhill and Neil Veira and Andreas G. Veneris and Zissis Poulos}, title = {Learning lemma support graphs in Quip and {IC3}}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {105--110}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031554}, doi = {10.1109/IVSW.2017.8031554}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/BerryhillVVP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/BreschMAMH17, author = {Cyril Bresch and Adrien Michelet and Laurent Amato and Thomas Meyer and David H{\'{e}}ly}, title = {A red team blue team approach towards a secure processor design with hardware shadow stack}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {57--62}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031545}, doi = {10.1109/IVSW.2017.8031545}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/BreschMAMH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/BurchardEHG0SKP17, author = {Jan Burchard and Ange{-}Salom{\'{e}} Messeng Ekossono and Jan Hor{\'{a}}cek and Mael Gay and Bernd Becker and Tobias Schubert and Martin Kreuzer and Ilia Polian}, title = {Towards mixed structural-functional models for algebraic fault attacks on ciphers}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {7--12}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031537}, doi = {10.1109/IVSW.2017.8031537}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/BurchardEHG0SKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/ChavisDHHYAB17, author = {Evan Chavis and Harrison Davis and Yijun Hou and Matthew Hicks and Salessawi Ferede Yitbarek and Todd M. Austin and Valeria Bertacco}, title = {{SNIFFER:} {A} high-accuracy malware detector for enterprise-based systems}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {70--75}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031547}, doi = {10.1109/IVSW.2017.8031547}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/ChavisDHHYAB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/FabianiLHT17, author = {Erwan Fabiani and Lo{\"{\i}}c Lagadec and Mohamed Ben Hammouda and Ciprian Teodorov}, title = {Asserting causal properties in High Level Synthesis}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {111--116}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031555}, doi = {10.1109/IVSW.2017.8031555}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ivsw/FabianiLHT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/FyrbiakSKWERP17, author = {Marc Fyrbiak and Sebastian Strauss and Christian Kison and Sebastian Wallat and Malte Elson and Nikol Rummel and Christof Paar}, title = {Hardware reverse engineering: Overview and open challenges}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {88--94}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031550}, doi = {10.1109/IVSW.2017.8031550}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/FyrbiakSKWERP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/GimenezCFF17, author = {Gregoire Gimenez and Abdelkarim Cherkaoui and Raphael Frisch and Laurent Fesquet}, title = {Self-timed Ring based True Random Number Generator: Threat model and countermeasures}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {31--38}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031541}, doi = {10.1109/IVSW.2017.8031541}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/GimenezCFF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/HorovitzKK17, author = {Karen Horovitz and Meha Kainth and Ryan Kenny}, title = {Protecting partial regions in {FPGA} bitstreams}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {123--127}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031557}, doi = {10.1109/IVSW.2017.8031557}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/HorovitzKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/HuangT17, author = {Kaibin Huang and Raylin Tso}, title = {Provable secure dual-server public key encryption with keyword search}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {39--44}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031542}, doi = {10.1109/IVSW.2017.8031542}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/HuangT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/KaminskaPJ17, author = {Bozena Kaminska and Jasbir N. Patel and Hao Jiang}, title = {Secure authentication of electronic systems with autonomous optical nano-devices}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {101--104}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031553}, doi = {10.1109/IVSW.2017.8031553}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/KaminskaPJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/LengZH17, author = {Elena Lai Leng Woo and Mark Zwolinski and Basel Halak}, title = {Hardware performance counters for system reliability monitoring}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {76--81}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031548}, doi = {10.1109/IVSW.2017.8031548}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/LengZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/McCannO17, author = {David McCann and Elisabeth Oswald}, title = {Practical evaluation of masking software countermeasures on an IoT processor}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031536}, doi = {10.1109/IVSW.2017.8031536}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/McCannO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/MispanHZ17, author = {Mohd Syafiq Mispan and Basel Halak and Mark Zwolinski}, title = {Lightweight obfuscation techniques for modeling attacks resistant PUFs}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {19--24}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031539}, doi = {10.1109/IVSW.2017.8031539}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/MispanHZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/MuredduPBBF17, author = {Ugo Mureddu and Oto Petura and Nathalie Bochard and Lilian Bossuet and Viktor Fischer}, title = {Efficient design of Oscillator based Physical Unclonable Functions on Flash FPGAs}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {146--151}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031560}, doi = {10.1109/IVSW.2017.8031560}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/MuredduPBBF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/NataleFDR17, author = {Giorgio Di Natale and Marie{-}Lise Flottes and Sophie Dupuis and Bruno Rouzeyre}, title = {Hacking the Control Flow error detection mechanism}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {51--56}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031544}, doi = {10.1109/IVSW.2017.8031544}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/NataleFDR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/PapadopoulosRKP17, author = {Padelis Papadopoulos and Anand Raman and Yorgos Koutsoyannopoulos and Nikolas Provatas and Magdy Abadir}, title = {Challenges and trends in {SOC} Electromagnetic {(EM)} Crosstalk}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {63--69}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031546}, doi = {10.1109/IVSW.2017.8031546}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/PapadopoulosRKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/Parker17, author = {Rachael J. Parker}, title = {Entropy justification for metastability based nondeterministic random bit generator}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {25--30}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031540}, doi = {10.1109/IVSW.2017.8031540}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/Parker17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/RoyBNM17, author = {Debapriya Basu Roy and Shivam Bhasin and Ivica Nikolic and Debdeep Mukhopadhyay}, title = {Opening pandora's box: Implication of {RLUT} on secure {FPGA} applications and {IP} security}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {134--139}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031558}, doi = {10.1109/IVSW.2017.8031558}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ivsw/RoyBNM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/SilvaFNR17, author = {Mathieu Da Silva and Marie{-}Lise Flottes and Giorgio Di Natale and Bruno Rouzeyre}, title = {Experimentations on scan chain encryption with {PRESENT}}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {45--50}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031543}, doi = {10.1109/IVSW.2017.8031543}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/SilvaFNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/TrimbergerM17, author = {Steve Trimberger and Steve McNeil}, title = {Security of FPGAs in data centers}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {117--122}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031556}, doi = {10.1109/IVSW.2017.8031556}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/TrimbergerM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/VatajeluNP17, author = {Elena Ioana Vatajelu and Giorgio Di Natale and Paolo Prinetto}, title = {Zero bit-error-rate weak {PUF} based on Spin-Transfer-Torque {MRAM} memories}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {128--133}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031552}, doi = {10.1109/IVSW.2017.8031552}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/VatajeluNP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/VliegenRM17, author = {Jo Vliegen and Oscar Reparaz and Nele Mentens}, title = {Maximizing the throughput of threshold-protected {AES-GCM} implementations on {FPGA}}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {140--145}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031559}, doi = {10.1109/IVSW.2017.8031559}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/VliegenRM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/WallatFSP17, author = {Sebastian Wallat and Marc Fyrbiak and Moritz Schl{\"{o}}gel and Christof Paar}, title = {A look at the dark side of hardware reverse engineering - a case study}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {95--100}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031551}, doi = {10.1109/IVSW.2017.8031551}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/WallatFSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/Weintraub17, author = {Eli Weintraub}, title = {Estimating Target Distribution in security assessment models}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {82--87}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031549}, doi = {10.1109/IVSW.2017.8031549}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/Weintraub17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ivsw/2017, title = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, publisher = {{IEEE}}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8024489/proceeding}, isbn = {978-1-5386-1708-3}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/AdlerBV16, author = {John Adler and Ryan Berryhill and Andreas G. Veneris}, title = {Revision debug with non-linear version history in regression verification}, booktitle = {1st {IEEE} International Verification and Security Workshop, {IVSW} 2016, Sant Feliu de Guixols, Spain, July 4-6, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IVSW.2016.7566604}, doi = {10.1109/IVSW.2016.7566604}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/AdlerBV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/AlimiLMT16, author = {Nejmeddine Alimi and Younes Lahbib and Mohsen Machhout and Rached Tourki}, title = {Simulation-based verification of large-integer arithmetic circuits}, booktitle = {1st {IEEE} International Verification and Security Workshop, {IVSW} 2016, Sant Feliu de Guixols, Spain, July 4-6, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IVSW.2016.7566601}, doi = {10.1109/IVSW.2016.7566601}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/AlimiLMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/ArumiMR16, author = {Daniel Arum{\'{\i}} and Salvador Manich and Rosa Rodr{\'{\i}}guez{-}Monta{\~{n}}{\'{e}}s}, title = {{RRAM} based cell for hardware security applications}, booktitle = {1st {IEEE} International Verification and Security Workshop, {IVSW} 2016, Sant Feliu de Guixols, Spain, July 4-6, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IVSW.2016.7566599}, doi = {10.1109/IVSW.2016.7566599}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/ArumiMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/BaDFNR16, author = {Papa{-}Sidy Ba and Sophie Dupuis and Marie{-}Lise Flottes and Giorgio Di Natale and Bruno Rouzeyre}, title = {Using outliers to detect stealthy hardware trojan triggering?}, booktitle = {1st {IEEE} International Verification and Security Workshop, {IVSW} 2016, Sant Feliu de Guixols, Spain, July 4-6, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IVSW.2016.7566609}, doi = {10.1109/IVSW.2016.7566609}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/BaDFNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/BenhassainMCHA16, author = {Ahmed Benhassain and Souhir Mhira and Florian Cacho and Vincent Huard and Lorena Anghel}, title = {In-situ slack monitors: taking up the challenge of on-die monitoring of variability and reliability}, booktitle = {1st {IEEE} International Verification and Security Workshop, {IVSW} 2016, Sant Feliu de Guixols, Spain, July 4-6, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IVSW.2016.7566606}, doi = {10.1109/IVSW.2016.7566606}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/BenhassainMCHA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/CabodiCFLSV16, author = {Gianpiero Cabodi and Paolo Camurati and Sebastiano F. Finocchiaro and Carmelo Loiacono and Francesco Savarese and Danilo Vendraminetto}, title = {Secure Path Verification}, booktitle = {1st {IEEE} International Verification and Security Workshop, {IVSW} 2016, Sant Feliu de Guixols, Spain, July 4-6, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IVSW.2016.7566608}, doi = {10.1109/IVSW.2016.7566608}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ivsw/CabodiCFLSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/CiepluchaP16, author = {Marek Cieplucha and Witold A. Pleskacz}, title = {New architecture of the object-oriented functional coverage mechanism for digital verification}, booktitle = {1st {IEEE} International Verification and Security Workshop, {IVSW} 2016, Sant Feliu de Guixols, Spain, July 4-6, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IVSW.2016.7566600}, doi = {10.1109/IVSW.2016.7566600}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/CiepluchaP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/LeveugleCMPHB16, author = {R{\'{e}}gis Leveugle and A. Chahed and Paolo Maistri and Athanasios Papadimitriou and David H{\'{e}}ly and Vincent Beroulle}, title = {On fault injections for early security evaluation vs. laser-based attacks}, booktitle = {1st {IEEE} International Verification and Security Workshop, {IVSW} 2016, Sant Feliu de Guixols, Spain, July 4-6, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IVSW.2016.7566603}, doi = {10.1109/IVSW.2016.7566603}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/LeveugleCMPHB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/RienerF16, author = {Heinz Riener and G{\"{o}}rschwin Fey}, title = {Counterexample-guided diagnosis}, booktitle = {1st {IEEE} International Verification and Security Workshop, {IVSW} 2016, Sant Feliu de Guixols, Spain, July 4-6, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IVSW.2016.7566605}, doi = {10.1109/IVSW.2016.7566605}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ivsw/RienerF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/TempelmeierS16, author = {Michael Tempelmeier and Georg Sigl}, title = {MaskVer: a tool helping designers detect flawed masking implementations}, booktitle = {1st {IEEE} International Verification and Security Workshop, {IVSW} 2016, Sant Feliu de Guixols, Spain, July 4-6, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IVSW.2016.7566602}, doi = {10.1109/IVSW.2016.7566602}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/TempelmeierS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/VourkasANSR16, author = {Ioannis Vourkas and Angel Abusleme and Vasileios G. Ntinas and Georgios Ch. Sirakoulis and Antonio Rubio}, title = {A Digital Memristor Emulator for FPGA-Based Artificial Neural Networks}, booktitle = {1st {IEEE} International Verification and Security Workshop, {IVSW} 2016, Sant Feliu de Guixols, Spain, July 4-6, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IVSW.2016.7566607}, doi = {10.1109/IVSW.2016.7566607}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/VourkasANSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ivsw/2016, title = {1st {IEEE} International Verification and Security Workshop, {IVSW} 2016, Sant Feliu de Guixols, Spain, July 4-6, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7565277/proceeding}, isbn = {978-1-5090-1141-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.