default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 560 matches
- 2024
- Lilas Alrahis, Hassan Nassar, Jonas Krautter, Dennis Gnad, Lars Bauer, Jörg Henkel, Mehdi B. Tahoori:
MaliGNNoma: GNN-Based Malicious Circuit Classifier for Secure Cloud FPGAs. HOST 2024: 383-393 - Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella:
A High Efficiency Hardware Design for the Post-Quantum KEM HQC. HOST 2024: 431-441 - Avinash Ayalasomayajula, Nusrat Farzana, Debjit Pal, Farimah Farahmandi:
Prioritizing Information Flow Violations: Generation of Ranked Security Assertions for Hardware Designs. HOST 2024: 128-138 - Adeen Ayub, Wooyeon Jo, Irfan Ahmed:
Charlie, Charlie, Charlie on Industrial Control Systems: PLC Control Logic Attacks by Design, Not by Chance. HOST 2024: 182-193 - Md Faizul Bari, Shreyas Sen:
NoiseHopper: Emission Hopping Air-Gap Covert Side Channel with Lower Probability of Detection. HOST 2024: 21-32 - Jessie Chen, Jakub Szefer:
All Your Base Are Belong To Us: Stealing VRP Secrets from Quantum Circuit Structures. HOST 2024: 415-419 - Zhenzhe Chen, Takashi Sato, Hirofumi Shinohara:
SpongePUF: A Modeling Attack Resilient Strong PUF with Scalable Challenge Response Pair. HOST 2024: 244-253 - Sanjay Das, Shamik Kundu, Kanad Basu:
Explainability to the Rescue: A Pattern-Based Approach for Detecting Adversarial Attacks. HOST 2024: 160-170 - Zachary DiMeglio, Jenna Bustami, Deniz Gurevin, Chenglu Jin, Marten van Dijk, Omer Khan:
Masked Memory Primitive for Key Insulated Schemes. HOST 2024: 293-303 - Hossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan:
Data-Oblivious ML Accelerators Using Hardware Security Extensions. HOST 2024: 373-377 - Tasnuva Farheen, Sourav Roy, Jia Di, Shahin Tajik, Domenic Forte:
Calibratable Polymorphic Temperature Sensor for Detecting Fault Injection and Side-Channel Attacks. HOST 2024: 211-221 - Hongming Fei, Owen Millwood, Prosanta Gope, Jack Miskelly, Biplab Sikdar:
PhenoAuth: A Novel PUF-Phenotype-Based Authentication Protocol for IoT Devices. HOST 2024: 309-319 - Anis Fellah-Touta, Lilian Bossuet, Carlos Andres Lara-Nino:
A Lightweight Non-Oscillatory Delay-Sensor for Remote Power Analysis. HOST 2024: 343-348 - Barbara Gigerl, Kevin Pretterhofer, Stefan Mangard:
Security Aspects of Masking on FPGAs. HOST 2024: 199-210 - Cheng Gongye, Yunsi Fei:
One Flip Away from Chaos: Unraveling Single Points of Failure in Quantized DNN s. HOST 2024: 332-342 - Jeferson González-Gómez, Hassan Nassar, Lars Bauer, Jörg Henkel:
LightFAt: Mitigating Control-Flow Explosion via Lightweight PMU-Based Control-Flow Attestation. HOST 2024: 222-226 - Neelofar Hassan, Urbi Chatterjee:
Machine Learning Attacks on Challenge-Response Obfuscations in Strong PUFs. HOST 2024: 361-372 - Sönke Jendral, Kalle Ngo, Ruize Wang, Elena Dubrova:
Breaking SCA-Protected CRYSTALS-Kyber with a Single Trace. HOST 2024: 70-73 - Emre Karabulut, Aydin Aysu:
A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature. HOST 2024: 90-100 - Sumanth N. Karanth, Sirish Oruganti, Meizhi Wang, Jaydeep P. Kulkarni:
Randomization Approaches for Secure SAR ADC Design Resilient Against Power Side-Channel Attacks. HOST 2024: 282-292 - Shamik Kundu, Navnil Choudhury, Sanjay Das, Arnab Raha, Kanad Basu:
QNAD: Quantum Noise Injection for Adversarial Defense in Deep Neural Networks. HOST 2024: 1-11 - Mark Lee, Chris Clark, Saibal Mukhopadhyay:
A Pre-Silicon Physical Design Study Towards Mitigating EMSCA on Cryptographic ICs. HOST 2024: 66-69 - Henian Li, Lang Lin, Norman Chang, Sreeja Chowdhury, Dylan Mcguire, Bozidar Novakovic, Kazuki Monta, Makoto Nagata, Ying-Shiun Li, Pramod M. S, Piin-Chen Yeh, Jyh-Shing Roger Jang, Chengjie Xi, Qiutong Jin, Navid Asadi, Mark M. Tehranipoor:
Photon Emission Modeling and Machine-Learning Assisted Pre-Silicon Optical Side-Channel Simulation. HOST 2024: 107-111 - Haipeng Li, Mabon Ninan, Boyang Wang, John Marty Emmert:
TinyPower: Side-Channel Attacks with Tiny Neural Networks. HOST 2024: 320-331 - Bharadwaj Madabhushi, Chandra Sekhar Mummidi, Sandip Kundu, Daniel E. Holcomb:
Resurrection Attack: Defeating Xilinx MPU's Memory Protection. HOST 2024: 394-403 - Saikat Majumdar, Radu Teodorescu:
Voltage Noise-Based Adversarial Attacks on Machine Learning Inference in Multi-Tenant FPGA Accelerators. HOST 2024: 80-85 - Upasana Mandal, Sarani Bhattacharya, Debdeep Mukhopadhyay:
Cache Wars: A Comparative Study of UMWAIT, UMONITOR, and Prime-Probe Attacks. HOST 2024: 86-89 - Vincent Meyers, Michael Hefenbrock, Dennis Gnad, Mehdi B. Tahoori:
Trained to Leak: Hiding Trojan Side-Channels in Neural Network Weights. HOST 2024: 122-127 - Samit Shahnawaz Miftah, Shamik Kundu, Austin Mordahl, Shiyi Wei, Kanad Basu:
RTL-Spec: RTL Spectrum Analysis for Security Bug Localization. HOST 2024: 171-181 - Nimish Mishra, Tridib Lochan Dutta, Shubhi Shukla, Anirban Chakraborty, Debdeep Mukhopadhyay:
Too Hot to Handle: Novel Thermal Side-Channel in Power Attack-Protected Intel Processors. HOST 2024: 378-382
skipping 530 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-08 16:09 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint