Search dblp for Publications

export results for "stream:streams/conf/ivsw:"

 download as .bib file

@inproceedings{DBLP:conf/ivsw/DuKZBSESSP19,
  author       = {Nan Du and
                  Mahdi Kiani and
                  Xianyue Zhao and
                  Danilo B{\"{u}}rger and
                  Oliver G. Schmidt and
                  Ramona Ecke and
                  Stefan E. Schulz and
                  Heidemarie Schmidt and
                  Ilia Polian},
  title        = {Electroforming-free Memristors for Hardware Security Primitives},
  booktitle    = {4th {IEEE} International Verification and Security Workshop, {IVSW}
                  2019, Rhodes Island, Greece, July 1-3, 2019},
  pages        = {67--70},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IVSW.2019.8854394},
  doi          = {10.1109/IVSW.2019.8854394},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/DuKZBSESSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/KarpAK19,
  author       = {Batya Karp and
                  Ofer Amrani and
                  Osnat Keren},
  title        = {Nonlinear Product Codes for Reliability and Security},
  booktitle    = {4th {IEEE} International Verification and Security Workshop, {IVSW}
                  2019, Rhodes Island, Greece, July 1-3, 2019},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IVSW.2019.8854455},
  doi          = {10.1109/IVSW.2019.8854455},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/KarpAK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/KazemiPSAAHB19,
  author       = {Zahra Kazemi and
                  Athanasios Papadimitriou and
                  Ioanna Souvatzoglou and
                  Ehsan Aerabi and
                  Mosabbah Mushir Ahmed and
                  David H{\'{e}}ly and
                  Vincent Beroulle},
  title        = {On a Low Cost Fault Injection Framework for Security Assessment of
                  Cyber-Physical Systems: Clock Glitch Attacks},
  booktitle    = {4th {IEEE} International Verification and Security Workshop, {IVSW}
                  2019, Rhodes Island, Greece, July 1-3, 2019},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IVSW.2019.8854391},
  doi          = {10.1109/IVSW.2019.8854391},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/KazemiPSAAHB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/MartinVNK19,
  author       = {Honorio Mart{\'{\i}}n and
                  Elena Ioana Vatajelu and
                  Giorgio Di Natale and
                  Osnat Keren},
  title        = {On the Reliability of the Ring Oscillator Physically Unclonable Functions},
  booktitle    = {4th {IEEE} International Verification and Security Workshop, {IVSW}
                  2019, Rhodes Island, Greece, July 1-3, 2019},
  pages        = {25--30},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IVSW.2019.8854401},
  doi          = {10.1109/IVSW.2019.8854401},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/MartinVNK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/MerandatRVQVMLF19,
  author       = {Marc Merandat and
                  Vincent Reynaud and
                  Emanuele Valea and
                  J{\'{e}}r{\^{o}}me Qu{\'{e}}vremont and
                  Nicolas Valette and
                  Paolo Maistri and
                  R{\'{e}}gis Leveugle and
                  Marie{-}Lise Flottes and
                  Sophie Dupuis and
                  Bruno Rouzeyre and
                  Giorgio Di Natale},
  title        = {A Comprehensive Approach to a Trusted Test Infrastructure},
  booktitle    = {4th {IEEE} International Verification and Security Workshop, {IVSW}
                  2019, Rhodes Island, Greece, July 1-3, 2019},
  pages        = {43--48},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IVSW.2019.8854428},
  doi          = {10.1109/IVSW.2019.8854428},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/MerandatRVQVMLF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/NejatKBHF19,
  author       = {Arash Nejat and
                  Zahra Kazemi and
                  Vincent Beroulle and
                  David H{\'{e}}ly and
                  Mahdi Fazeli},
  title        = {Restricting Switching Activity Using Logic Locking to Improve Power
                  Analysis-Based Trojan Detection},
  booktitle    = {4th {IEEE} International Verification and Security Workshop, {IVSW}
                  2019, Rhodes Island, Greece, July 1-3, 2019},
  pages        = {49--54},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IVSW.2019.8854402},
  doi          = {10.1109/IVSW.2019.8854402},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ivsw/NejatKBHF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/SiddiquiSBBPS19,
  author       = {Ali Shuja Siddiqui and
                  Geraldine Shirley and
                  Shreya Bendre and
                  Girija Bhagwat and
                  Jim Plusquellic and
                  Fareena Saqib},
  title        = {Secure Design Flow of {FPGA} Based {RISC-V} Implementation},
  booktitle    = {4th {IEEE} International Verification and Security Workshop, {IVSW}
                  2019, Rhodes Island, Greece, July 1-3, 2019},
  pages        = {37--42},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IVSW.2019.8854418},
  doi          = {10.1109/IVSW.2019.8854418},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/SiddiquiSBBPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/SinglaLG19,
  author       = {Aayush Singla and
                  Bernhard Lippmann and
                  Helmut Graeb},
  title        = {Verification of Physical Chip Layouts Using {GDSII} Design Data},
  booktitle    = {4th {IEEE} International Verification and Security Workshop, {IVSW}
                  2019, Rhodes Island, Greece, July 1-3, 2019},
  pages        = {55--60},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IVSW.2019.8854432},
  doi          = {10.1109/IVSW.2019.8854432},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/SinglaLG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/SuHZ19,
  author       = {Haibo Su and
                  Basel Halak and
                  Mark Zwolinski},
  title        = {Two-Stage Architectures for Resilient Lightweight PUFs},
  booktitle    = {4th {IEEE} International Verification and Security Workshop, {IVSW}
                  2019, Rhodes Island, Greece, July 1-3, 2019},
  pages        = {19--24},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IVSW.2019.8854400},
  doi          = {10.1109/IVSW.2019.8854400},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/SuHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/TakakisMND19,
  author       = {Zacharias Takakis and
                  Dimitrios Mangiras and
                  Chrysostomos Nicopoulos and
                  Giorgos Dimitrakopoulos},
  title        = {Dynamic Adjustment of Test-Sequence Duration for Increasing the Functional
                  Coverage},
  booktitle    = {4th {IEEE} International Verification and Security Workshop, {IVSW}
                  2019, Rhodes Island, Greece, July 1-3, 2019},
  pages        = {61--66},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IVSW.2019.8854389},
  doi          = {10.1109/IVSW.2019.8854389},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ivsw/TakakisMND19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/YilmazH19,
  author       = {Yildiran Yilmaz and
                  Basel Halak},
  title        = {A Two-Flights Mutual Authentication for Energy-Constrained IoT Devices},
  booktitle    = {4th {IEEE} International Verification and Security Workshop, {IVSW}
                  2019, Rhodes Island, Greece, July 1-3, 2019},
  pages        = {31--36},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IVSW.2019.8854438},
  doi          = {10.1109/IVSW.2019.8854438},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/YilmazH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/YuHZ19,
  author       = {Miao Yu and
                  Basel Halak and
                  Mark Zwolinski},
  title        = {Using Hardware Performance Counters to Detect Control Hijacking Attacks},
  booktitle    = {4th {IEEE} International Verification and Security Workshop, {IVSW}
                  2019, Rhodes Island, Greece, July 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IVSW.2019.8854399},
  doi          = {10.1109/IVSW.2019.8854399},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ivsw/YuHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ivsw/2019,
  title        = {4th {IEEE} International Verification and Security Workshop, {IVSW}
                  2019, Rhodes Island, Greece, July 1-3, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8850848/proceeding},
  isbn         = {978-1-7281-2671-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/AhmedHPBSBG18,
  author       = {Mosabbah Mushir Ahmed and
                  David H{\'{e}}ly and
                  Etienne Perret and
                  Nicolas Barbot and
                  Romain Siragusa and
                  Maxime Bernier and
                  Fr{\'{e}}d{\'{e}}ric Garet},
  title        = {Authentication of Microcontroller Board Using Non-Invasive {EM} Emission
                  Technique},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {25--30},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494883},
  doi          = {10.1109/IVSW.2018.8494883},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/AhmedHPBSBG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/BarenghiBIP18,
  author       = {Alessandro Barenghi and
                  Luca Breveglieri and
                  Niccol{\`{o}} Izzo and
                  Gerardo Pelosi},
  title        = {Software-only Reverse Engineering of Physical {DRAM} Mappings for
                  Rowhammer Attacks},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {19--24},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494868},
  doi          = {10.1109/IVSW.2018.8494868},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/BarenghiBIP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/Drechsler18,
  author       = {Rolf Drechsler},
  title        = {Keynotes: Towards Self-Explaining Digital Systems: {A} Design Methodology
                  for the Next Generation},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {i--iii},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494895},
  doi          = {10.1109/IVSW.2018.8494895},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/Drechsler18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/DrechslerLFG18,
  author       = {Rolf Drechsler and
                  Christoph L{\"{u}}th and
                  G{\"{o}}rschwin Fey and
                  Tim G{\"{u}}neysu},
  title        = {Towards Self-Explaining Digital Systems: {A} Design Methodology for
                  the Next Generation},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494900},
  doi          = {10.1109/IVSW.2018.8494900},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ivsw/DrechslerLFG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/ElhamsharyIE18,
  author       = {Amira Elhamshary and
                  Yehea Ismail and
                  Said Elkhamy},
  title        = {Security Analysis of Chaotic Baker Maps},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {44--47},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494880},
  doi          = {10.1109/IVSW.2018.8494880},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/ElhamsharyIE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/FaconGLSS18,
  author       = {Adrien Facon and
                  Sylvain Guilley and
                  Matthieu Lec'Hvien and
                  Alexander Schaub and
                  Youssef Souissi},
  title        = {Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography
                  Algorithms},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494855},
  doi          = {10.1109/IVSW.2018.8494855},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ivsw/FaconGLSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/HastingsJGH18,
  author       = {Adam Hastings and
                  Sean Jensen and
                  Jeffrey Goeders and
                  Brad L. Hutchings},
  title        = {Using Physical and Functional Comparisons to Assure 3rd-Party {IP}
                  for Modern FPGAs},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {80--86},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494874},
  doi          = {10.1109/IVSW.2018.8494874},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/HastingsJGH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/KazemiPHFB18,
  author       = {Zahra Kazemi and
                  Athanasios Papadimitriou and
                  David H{\'{e}}ly and
                  Mahdi Fazeli and
                  Vincent Beroulle},
  title        = {Hardware Security Evaluation Platform for MCU-Based Connected Devices:
                  Application to Healthcare IoT},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {87--92},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494843},
  doi          = {10.1109/IVSW.2018.8494843},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/KazemiPHFB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/LeWDZJ18,
  author       = {Thao Le and
                  Lucas Weaver and
                  Jia Di and
                  Shaojie Zhang and
                  Yier Jin},
  title        = {Hardware Trojan Detection and Functionality Determination for Soft
                  IPs},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {56--61},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494891},
  doi          = {10.1109/IVSW.2018.8494891},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/LeWDZJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/MahmudOK18,
  author       = {Shakil Mahmud and
                  Brooks Olney and
                  Robert Karam},
  title        = {Architectural Diversity: Bio-Inspired Hardware Security for FPGAs},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {48--51},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494854},
  doi          = {10.1109/IVSW.2018.8494854},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/MahmudOK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/Marcelli0SS18,
  author       = {Andrea Marcelli and
                  Ernesto S{\'{a}}nchez and
                  Luca Sasselli and
                  Giovanni Squillero},
  title        = {On the Mitigation of Hardware Trojan Attacks in Embedded Processors
                  by Exploiting a Hardware-Based Obfuscator},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {31--37},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494850},
  doi          = {10.1109/IVSW.2018.8494850},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/Marcelli0SS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/QinHMT18,
  author       = {Maoyuan Qin and
                  Wei Hu and
                  Dejun Mu and
                  Yu Tai},
  title        = {Property Based Formal Security Verification for Hardware Trojan Detection},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {62--67},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494858},
  doi          = {10.1109/IVSW.2018.8494858},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/QinHMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/RahmanSTSWTA18,
  author       = {M. Tanjidur Rahman and
                  Qihang Shi and
                  Shahin Tajik and
                  Hao{-}Ting Shen and
                  Damon L. Woodard and
                  Mark M. Tehranipoor and
                  Navid Asadizanjani},
  title        = {Physical Inspection {\&} Attacks: New Frontier in Hardware Security},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {93--102},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494856},
  doi          = {10.1109/IVSW.2018.8494856},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ivsw/RahmanSTSWTA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/SilvaVFDNR18,
  author       = {Mathieu Da Silva and
                  Emanuele Valea and
                  Marie{-}Lise Flottes and
                  Sophie Dupuis and
                  Giorgio Di Natale and
                  Bruno Rouzeyre},
  title        = {A New Secure Stream Cipher for Scan Chain Encryption},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {68--73},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494852},
  doi          = {10.1109/IVSW.2018.8494852},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/SilvaVFDNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/SuZH18,
  author       = {Haibo Su and
                  Mark Zwolinski and
                  Basel Halak},
  title        = {A Machine Learning Attacks Resistant Two Stage Physical Unclonable
                  Functions Design},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {52--55},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494839},
  doi          = {10.1109/IVSW.2018.8494839},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/SuZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/TakarabtCFGMSS18,
  author       = {Sofiane Takarabt and
                  Kais Chibani and
                  Adrien Facon and
                  Sylvain Guilley and
                  Yves Mathieu and
                  Laurent Sauvage and
                  Youssef Souissi},
  title        = {Pre-silicon Embedded System Evaluation as New {EDA} Tool for Security
                  Verification},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {74--79},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494881},
  doi          = {10.1109/IVSW.2018.8494881},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/TakarabtCFGMSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/WernerLBG18,
  author       = {Michael Werner and
                  Bernhard Lippmann and
                  Johanna Baehr and
                  Helmut Gr{\"{a}}b},
  title        = {Reverse Engineering of Cryptographic Cores by Structural Interpretation
                  Through Graph Analysis},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494896},
  doi          = {10.1109/IVSW.2018.8494896},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/WernerLBG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/YilmazGH18,
  author       = {Yildiran Yilmaz and
                  Steve R. Gunn and
                  Basel Halak},
  title        = {Lightweight PUF-Based Authentication Protocol for IoT Devices},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {38--43},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494884},
  doi          = {10.1109/IVSW.2018.8494884},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/YilmazGH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ivsw/2018,
  title        = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8482238/proceeding},
  isbn         = {978-1-5386-6544-2},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/AftabjahaniD17,
  author       = {Seyed{-}Abdollah Aftabjahani and
                  Amitabh Das},
  title        = {Robust secure design by increasing the resilience of Attack Protection
                  Blocks},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031538},
  doi          = {10.1109/IVSW.2017.8031538},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/AftabjahaniD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/BerryhillVVP17,
  author       = {Ryan Berryhill and
                  Neil Veira and
                  Andreas G. Veneris and
                  Zissis Poulos},
  title        = {Learning lemma support graphs in Quip and {IC3}},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {105--110},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031554},
  doi          = {10.1109/IVSW.2017.8031554},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/BerryhillVVP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/BreschMAMH17,
  author       = {Cyril Bresch and
                  Adrien Michelet and
                  Laurent Amato and
                  Thomas Meyer and
                  David H{\'{e}}ly},
  title        = {A red team blue team approach towards a secure processor design with
                  hardware shadow stack},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {57--62},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031545},
  doi          = {10.1109/IVSW.2017.8031545},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/BreschMAMH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/BurchardEHG0SKP17,
  author       = {Jan Burchard and
                  Ange{-}Salom{\'{e}} Messeng Ekossono and
                  Jan Hor{\'{a}}cek and
                  Mael Gay and
                  Bernd Becker and
                  Tobias Schubert and
                  Martin Kreuzer and
                  Ilia Polian},
  title        = {Towards mixed structural-functional models for algebraic fault attacks
                  on ciphers},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031537},
  doi          = {10.1109/IVSW.2017.8031537},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/BurchardEHG0SKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/ChavisDHHYAB17,
  author       = {Evan Chavis and
                  Harrison Davis and
                  Yijun Hou and
                  Matthew Hicks and
                  Salessawi Ferede Yitbarek and
                  Todd M. Austin and
                  Valeria Bertacco},
  title        = {{SNIFFER:} {A} high-accuracy malware detector for enterprise-based
                  systems},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {70--75},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031547},
  doi          = {10.1109/IVSW.2017.8031547},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/ChavisDHHYAB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/FabianiLHT17,
  author       = {Erwan Fabiani and
                  Lo{\"{\i}}c Lagadec and
                  Mohamed Ben Hammouda and
                  Ciprian Teodorov},
  title        = {Asserting causal properties in High Level Synthesis},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {111--116},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031555},
  doi          = {10.1109/IVSW.2017.8031555},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ivsw/FabianiLHT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/FyrbiakSKWERP17,
  author       = {Marc Fyrbiak and
                  Sebastian Strauss and
                  Christian Kison and
                  Sebastian Wallat and
                  Malte Elson and
                  Nikol Rummel and
                  Christof Paar},
  title        = {Hardware reverse engineering: Overview and open challenges},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {88--94},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031550},
  doi          = {10.1109/IVSW.2017.8031550},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/FyrbiakSKWERP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/GimenezCFF17,
  author       = {Gregoire Gimenez and
                  Abdelkarim Cherkaoui and
                  Raphael Frisch and
                  Laurent Fesquet},
  title        = {Self-timed Ring based True Random Number Generator: Threat model and
                  countermeasures},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {31--38},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031541},
  doi          = {10.1109/IVSW.2017.8031541},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/GimenezCFF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/HorovitzKK17,
  author       = {Karen Horovitz and
                  Meha Kainth and
                  Ryan Kenny},
  title        = {Protecting partial regions in {FPGA} bitstreams},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {123--127},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031557},
  doi          = {10.1109/IVSW.2017.8031557},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/HorovitzKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/HuangT17,
  author       = {Kaibin Huang and
                  Raylin Tso},
  title        = {Provable secure dual-server public key encryption with keyword search},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {39--44},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031542},
  doi          = {10.1109/IVSW.2017.8031542},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/HuangT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/KaminskaPJ17,
  author       = {Bozena Kaminska and
                  Jasbir N. Patel and
                  Hao Jiang},
  title        = {Secure authentication of electronic systems with autonomous optical
                  nano-devices},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {101--104},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031553},
  doi          = {10.1109/IVSW.2017.8031553},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/KaminskaPJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/LengZH17,
  author       = {Elena Lai Leng Woo and
                  Mark Zwolinski and
                  Basel Halak},
  title        = {Hardware performance counters for system reliability monitoring},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {76--81},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031548},
  doi          = {10.1109/IVSW.2017.8031548},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/LengZH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/McCannO17,
  author       = {David McCann and
                  Elisabeth Oswald},
  title        = {Practical evaluation of masking software countermeasures on an IoT
                  processor},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031536},
  doi          = {10.1109/IVSW.2017.8031536},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/McCannO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/MispanHZ17,
  author       = {Mohd Syafiq Mispan and
                  Basel Halak and
                  Mark Zwolinski},
  title        = {Lightweight obfuscation techniques for modeling attacks resistant
                  PUFs},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {19--24},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031539},
  doi          = {10.1109/IVSW.2017.8031539},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/MispanHZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/MuredduPBBF17,
  author       = {Ugo Mureddu and
                  Oto Petura and
                  Nathalie Bochard and
                  Lilian Bossuet and
                  Viktor Fischer},
  title        = {Efficient design of Oscillator based Physical Unclonable Functions
                  on Flash FPGAs},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {146--151},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031560},
  doi          = {10.1109/IVSW.2017.8031560},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/MuredduPBBF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/NataleFDR17,
  author       = {Giorgio Di Natale and
                  Marie{-}Lise Flottes and
                  Sophie Dupuis and
                  Bruno Rouzeyre},
  title        = {Hacking the Control Flow error detection mechanism},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {51--56},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031544},
  doi          = {10.1109/IVSW.2017.8031544},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/NataleFDR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/PapadopoulosRKP17,
  author       = {Padelis Papadopoulos and
                  Anand Raman and
                  Yorgos Koutsoyannopoulos and
                  Nikolas Provatas and
                  Magdy Abadir},
  title        = {Challenges and trends in {SOC} Electromagnetic {(EM)} Crosstalk},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {63--69},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031546},
  doi          = {10.1109/IVSW.2017.8031546},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/PapadopoulosRKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/Parker17,
  author       = {Rachael J. Parker},
  title        = {Entropy justification for metastability based nondeterministic random
                  bit generator},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {25--30},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031540},
  doi          = {10.1109/IVSW.2017.8031540},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/Parker17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/RoyBNM17,
  author       = {Debapriya Basu Roy and
                  Shivam Bhasin and
                  Ivica Nikolic and
                  Debdeep Mukhopadhyay},
  title        = {Opening pandora's box: Implication of {RLUT} on secure {FPGA} applications
                  and {IP} security},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {134--139},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031558},
  doi          = {10.1109/IVSW.2017.8031558},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ivsw/RoyBNM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/SilvaFNR17,
  author       = {Mathieu Da Silva and
                  Marie{-}Lise Flottes and
                  Giorgio Di Natale and
                  Bruno Rouzeyre},
  title        = {Experimentations on scan chain encryption with {PRESENT}},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {45--50},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031543},
  doi          = {10.1109/IVSW.2017.8031543},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/SilvaFNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/TrimbergerM17,
  author       = {Steve Trimberger and
                  Steve McNeil},
  title        = {Security of FPGAs in data centers},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {117--122},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031556},
  doi          = {10.1109/IVSW.2017.8031556},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/TrimbergerM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/VatajeluNP17,
  author       = {Elena Ioana Vatajelu and
                  Giorgio Di Natale and
                  Paolo Prinetto},
  title        = {Zero bit-error-rate weak {PUF} based on Spin-Transfer-Torque {MRAM}
                  memories},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {128--133},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031552},
  doi          = {10.1109/IVSW.2017.8031552},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/VatajeluNP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/VliegenRM17,
  author       = {Jo Vliegen and
                  Oscar Reparaz and
                  Nele Mentens},
  title        = {Maximizing the throughput of threshold-protected {AES-GCM} implementations
                  on {FPGA}},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {140--145},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031559},
  doi          = {10.1109/IVSW.2017.8031559},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/VliegenRM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/WallatFSP17,
  author       = {Sebastian Wallat and
                  Marc Fyrbiak and
                  Moritz Schl{\"{o}}gel and
                  Christof Paar},
  title        = {A look at the dark side of hardware reverse engineering - a case study},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {95--100},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031551},
  doi          = {10.1109/IVSW.2017.8031551},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/WallatFSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/Weintraub17,
  author       = {Eli Weintraub},
  title        = {Estimating Target Distribution in security assessment models},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {82--87},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031549},
  doi          = {10.1109/IVSW.2017.8031549},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/Weintraub17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ivsw/2017,
  title        = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8024489/proceeding},
  isbn         = {978-1-5386-1708-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/AdlerBV16,
  author       = {John Adler and
                  Ryan Berryhill and
                  Andreas G. Veneris},
  title        = {Revision debug with non-linear version history in regression verification},
  booktitle    = {1st {IEEE} International Verification and Security Workshop, {IVSW}
                  2016, Sant Feliu de Guixols, Spain, July 4-6, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IVSW.2016.7566604},
  doi          = {10.1109/IVSW.2016.7566604},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/AdlerBV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/AlimiLMT16,
  author       = {Nejmeddine Alimi and
                  Younes Lahbib and
                  Mohsen Machhout and
                  Rached Tourki},
  title        = {Simulation-based verification of large-integer arithmetic circuits},
  booktitle    = {1st {IEEE} International Verification and Security Workshop, {IVSW}
                  2016, Sant Feliu de Guixols, Spain, July 4-6, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IVSW.2016.7566601},
  doi          = {10.1109/IVSW.2016.7566601},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/AlimiLMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/ArumiMR16,
  author       = {Daniel Arum{\'{\i}} and
                  Salvador Manich and
                  Rosa Rodr{\'{\i}}guez{-}Monta{\~{n}}{\'{e}}s},
  title        = {{RRAM} based cell for hardware security applications},
  booktitle    = {1st {IEEE} International Verification and Security Workshop, {IVSW}
                  2016, Sant Feliu de Guixols, Spain, July 4-6, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IVSW.2016.7566599},
  doi          = {10.1109/IVSW.2016.7566599},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/ArumiMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/BaDFNR16,
  author       = {Papa{-}Sidy Ba and
                  Sophie Dupuis and
                  Marie{-}Lise Flottes and
                  Giorgio Di Natale and
                  Bruno Rouzeyre},
  title        = {Using outliers to detect stealthy hardware trojan triggering?},
  booktitle    = {1st {IEEE} International Verification and Security Workshop, {IVSW}
                  2016, Sant Feliu de Guixols, Spain, July 4-6, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IVSW.2016.7566609},
  doi          = {10.1109/IVSW.2016.7566609},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/BaDFNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/BenhassainMCHA16,
  author       = {Ahmed Benhassain and
                  Souhir Mhira and
                  Florian Cacho and
                  Vincent Huard and
                  Lorena Anghel},
  title        = {In-situ slack monitors: taking up the challenge of on-die monitoring
                  of variability and reliability},
  booktitle    = {1st {IEEE} International Verification and Security Workshop, {IVSW}
                  2016, Sant Feliu de Guixols, Spain, July 4-6, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IVSW.2016.7566606},
  doi          = {10.1109/IVSW.2016.7566606},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/BenhassainMCHA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/CabodiCFLSV16,
  author       = {Gianpiero Cabodi and
                  Paolo Camurati and
                  Sebastiano F. Finocchiaro and
                  Carmelo Loiacono and
                  Francesco Savarese and
                  Danilo Vendraminetto},
  title        = {Secure Path Verification},
  booktitle    = {1st {IEEE} International Verification and Security Workshop, {IVSW}
                  2016, Sant Feliu de Guixols, Spain, July 4-6, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IVSW.2016.7566608},
  doi          = {10.1109/IVSW.2016.7566608},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ivsw/CabodiCFLSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/CiepluchaP16,
  author       = {Marek Cieplucha and
                  Witold A. Pleskacz},
  title        = {New architecture of the object-oriented functional coverage mechanism
                  for digital verification},
  booktitle    = {1st {IEEE} International Verification and Security Workshop, {IVSW}
                  2016, Sant Feliu de Guixols, Spain, July 4-6, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IVSW.2016.7566600},
  doi          = {10.1109/IVSW.2016.7566600},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/CiepluchaP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/LeveugleCMPHB16,
  author       = {R{\'{e}}gis Leveugle and
                  A. Chahed and
                  Paolo Maistri and
                  Athanasios Papadimitriou and
                  David H{\'{e}}ly and
                  Vincent Beroulle},
  title        = {On fault injections for early security evaluation vs. laser-based
                  attacks},
  booktitle    = {1st {IEEE} International Verification and Security Workshop, {IVSW}
                  2016, Sant Feliu de Guixols, Spain, July 4-6, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IVSW.2016.7566603},
  doi          = {10.1109/IVSW.2016.7566603},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/LeveugleCMPHB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/RienerF16,
  author       = {Heinz Riener and
                  G{\"{o}}rschwin Fey},
  title        = {Counterexample-guided diagnosis},
  booktitle    = {1st {IEEE} International Verification and Security Workshop, {IVSW}
                  2016, Sant Feliu de Guixols, Spain, July 4-6, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IVSW.2016.7566605},
  doi          = {10.1109/IVSW.2016.7566605},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ivsw/RienerF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/TempelmeierS16,
  author       = {Michael Tempelmeier and
                  Georg Sigl},
  title        = {MaskVer: a tool helping designers detect flawed masking implementations},
  booktitle    = {1st {IEEE} International Verification and Security Workshop, {IVSW}
                  2016, Sant Feliu de Guixols, Spain, July 4-6, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IVSW.2016.7566602},
  doi          = {10.1109/IVSW.2016.7566602},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/TempelmeierS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/VourkasANSR16,
  author       = {Ioannis Vourkas and
                  Angel Abusleme and
                  Vasileios G. Ntinas and
                  Georgios Ch. Sirakoulis and
                  Antonio Rubio},
  title        = {A Digital Memristor Emulator for FPGA-Based Artificial Neural Networks},
  booktitle    = {1st {IEEE} International Verification and Security Workshop, {IVSW}
                  2016, Sant Feliu de Guixols, Spain, July 4-6, 2016},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IVSW.2016.7566607},
  doi          = {10.1109/IVSW.2016.7566607},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/VourkasANSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ivsw/2016,
  title        = {1st {IEEE} International Verification and Security Workshop, {IVSW}
                  2016, Sant Feliu de Guixols, Spain, July 4-6, 2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7565277/proceeding},
  isbn         = {978-1-5090-1141-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics