Xiaoxiao Wang, Yueyu Guo, M. Tauhidur Ramhan, Dongrong Zhang and Mark Tehranipoor. DOST: Dynamically Obfuscated Wrapper for Split Test against IC Piracy
Kun Yang, Ulbert Botero, Haoting Shen, Domenic Forte and Mark Tehranipoor. A Split Manufacturing Approach for Unclonable Chipless RFIDs for Pharmaceutical Supply Chain Security
Bohan Yang, Vladimir Rozic, Milos Grujic, Nele Mentens and Ingrid Verbauwhede. On-chip jitter measurement for true random number generators
Yuan Cao, Chip Hong Chang, Yue Zheng and Xiaojin Zhao. An Energy-efficient True Random Number Generator Based on Current Starved Ring Oscillators
Xiaolong Guo, Raj Gautam Dutta, Jiaji He and Yier Jin. PCH Framework for IP Runtime Security Verification
Fan Zhang, Liang Geng, Jizhong Shen, Shivam Bhasin, Xinjie Zhao and Shize Guo. Improved low-entropy masking scheme for LED with mitigation against correlation-enhanced collision attacks
Tian Wang, Xiaoxin Cui, Yewen Ni, Dunshan Yu, Xiaole Cui and Gang Qu. A Practical Cold Boot Attack on RSA Private Keys
Sharareh Zamanzadeh and Ali Jahanian. Scalable Security Path Methodology: A Cost-security Trade-off to Protect FPGA IPs against Active and Passive Tampers
Shuang Wang, Yang Li and Jian Wang. A New Key Rank Estimation Method to Investigate Dependent Key Lists of Side Channel Attacks
Zimu Guo, Xiaolin Xu, Mark Tehranipoor and Domenic Forte. MPA: Model-assisted PCB Attestation via Board-level RO and Temperature Compensation
Rui Liu, Huaqiang Wu, Yachuan Pang, He Qian and Shimeng Yu. Extending 1kb RRAM Array from Weak PUF to Strong PUF by Employment of SHA Module
Chinmay Deshpande, Bilgiday Yuce, Patrick Schaumont and Leyla Nazhandali. Employing Dual-complementary Flip-Flops to Detect EMFI Attacks
Mengmei Ye, Mehrdad Zaker Shahrak and Sheng Wei. PUFSec: Protecting Physical Unclonable Functions Using Hardware Isolation-based System Security Techniques
Wei-Che Wang, Yair Yona, Yizhang Wu, Szu-Yao Hung, Suhas Diggavi and Puneet Gupta. Implementation of Stable PUFs Using Gate Oxide Breakdown
Robert Karam, Tamzidul Hoque, Kevin Butler and Swarup Bhunia. Mixed-Granular Architectural Diversity for Device Security in the Internet of Things
Nektarios Georgios Tsoutsos and Michail Maniatakos. Obfuscating Branch Decisions based on Encrypted Data using MISR and Hash Digests
Jiafeng Xie and Xiaojun Zhou. Evaluating Obfuscation Performance of Novel Algorithm-to-Architecture Mapping Techniques in Systolic-Array-based Circuits
Zhonghao Liao, George Amariucai, Raymond Wong and Yong Guan. The Impact of Discharge Inversion Effect on Learning SRAM Power-Up Statistics
Ali Shuja Siddiqui, Chia-Che Lee, Wenjie Che, Jim Plusquellic and Fareena Saqib. Secure Intra-Vehicular Communication over CANFD
Festus Hategekimana, Taylor Whitaker, Md Jubaer Hossain and Christophe Bobda. Secure Integration of Non-Trusted IPs in SoCs
Patrick Cronin, Chengmo Yang, Dongqin Zhou, Keni Qui, Xin Shi and Yongpan Liu. 'The Dangers of Sleeping', an Exploration of Security in Non-Volatile Processors
Jing Ye, Yue Gong, Yu Hu and Xiaowei Li. Polymorphic PUF: Exploiting Reconfigurability of CPU+FPGA SoC to Resist Modeling Attack