Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2019
- Manaar Alam, Sarani Bhattacharya, Swastika Dutta, Sayan Sinha, Debdeep Mukhopadhyay, Anupam Chattopadhyay:
RATAFIA: Ransomware Analysis using Time And Frequency Informed Autoencoders. HOST 2019: 218-227 - Michaela Brunner, Johanna Baehr, Georg Sigl:
Improving on State Register Identification in Sequential Hardware Reverse Engineering. HOST 2019: 151-160 - Prabuddha Chakraborty, Jonathan Cruz, Swarup Bhunia:
SURF: Joint Structural Functional Attack on Logic Locking. HOST 2019: 181-190 - Nikhil Chawla, Arvind Singh, Nael Mizanur Rahman, Monodeep Kar, Saibal Mukhopadhyay:
Extracting Side-Channel Leakage from Round Unrolled Implementations of Lightweight Ciphers. HOST 2019: 31-40 - Suyuan Chen, Ranga Vemuri:
Exploiting Proximity Information in a Satisfiability Based Attack Against Split Manufactured Circuits. HOST 2019: 171-180 - Brice Colombier, Alexandre Menu, Jean-Max Dutertre, Pierre-Alain Moëllic, Jean-Baptiste Rigaud, Jean-Luc Danger:
Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller. HOST 2019: 1-10 - Patrick Cronin, Chengmo Yang:
A Fetching Tale: Covert Communication with the Hardware Prefetcher. HOST 2019: 101-110 - Debayan Das, Mayukh Nath, Baibhab Chatterjee, Santosh Ghosh, Shreyas Sen:
STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis. HOST 2019: 11-20 - Daniel Dinu, Archanaa S. Krishnan, Patrick Schaumont:
SIA: Secure Intermittent Architecture for Off-the-Shelf Resource-Constrained Microcontrollers. HOST 2019: 208-217 - Adam Duncan, Grant Skipper, Andrew Stern, Adib Nahiyan, Fahim Rahman, Andrew Lukefahr, Mark M. Tehranipoor, Martin Swany:
FLATS: Filling Logic and Testing Spatially for FPGA Authentication and Tamper Detection. HOST 2019: 81-90 - Tim Fritzmann, Johanna Sepúlveda:
Efficient and Flexible Low-Power NTT for Lattice-Based Cryptography. HOST 2019: 141-150 - Ujjwal Guin, Wendong Wang, Charles Harper, Adit D. Singh:
Detecting Recycled SoCs by Exploiting Aging Induced Biases in Memory Cells. HOST 2019: 72-80 - Xiaolong Guo, Raj Gautam Dutta, Jiaji He, Mark M. Tehranipoor, Yier Jin:
QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment. HOST 2019: 91-100 - Andreas Herkle, Holger Mandry, Joachim Becker, Maurits Ortmanns:
In-depth Analysis and Enhancements of RO-PUFs with a Partial Reconfiguration Framework on Xilinx Zynq-7000 SoC FPGAs. HOST 2019: 238-247 - Chiou-Yng Lee, Jiafeng Xie:
High Capability and Low-Complexity: Novel Fault Detection Scheme for Finite Field Multipliers over GF(2m) based on MSPB. HOST 2019: 21-30 - Ge Li, Vishnuvardhan V. Iyer, Michael Orshansky:
Securing AES against Localized EM Attacks through Spatial Randomization of Dataflow. HOST 2019: 191-197 - Mohammed Nabeel, Mohammed Ashraf, Eduardo Chielle, Nektarios Georgios Tsoutsos, Michail Maniatakos:
CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution. HOST 2019: 131-140 - Karthikeyan Nagarajan, Mohammad Nasim Imtiaz Khan, Swaroop Ghosh:
ENTT: A Family of Emerging NVM-based Trojan Triggers. HOST 2019: 51-60 - Keyvan Ramezanpour, Paul Ampadu, William Diehl:
A Statistical Fault Analysis Methodology for the Ascon Authenticated Cipher. HOST 2019: 41-50 - M. Sadegh Riazi, Mojan Javaheripi, Siam U. Hussain, Farinaz Koushanfar:
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation. HOST 2019: 198-207 - Kaveh Shamsi, David Z. Pan, Yier Jin:
On the Impossibility of Approximation-Resilient Circuit Locking. HOST 2019: 161-170 - Qihang Shi, Nidish Vashistha, Hangwei Lu, Hao-Ting Shen, Bahar Tehranipoor, Damon L. Woodard, Navid Asadizanjani:
Golden Gates: A New Hybrid Approach for Rapid Hardware Trojan Detection using Testing and Imaging. HOST 2019: 61-71 - Michael Tempelmeier, Maximilian Werner, Georg Sigl:
Using Hardware Software Codesign for Optimised Implementations of High-Speed and Defence in Depth CAESAR Finalists. HOST 2019: 228-237 - Shijia Wei, Aydin Aysu, Michael Orshansky, Andreas Gerstlauer, Mohit Tiwari:
Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems. HOST 2019: 111-120 - Fan Yao, Hongyu Fang, Milos Doroslovacki, Guru Venkataramani:
COTSknight: Practical Defense against Cache Timing Channel Attacks using Cache Monitoring and Partitioning Technologies. HOST 2019: 121-130 - IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2019, McLean, VA, USA, May 5-10, 2019. IEEE 2019, ISBN 978-1-5386-8064-3 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-03-28 11:35 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint