IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST) is an annual symposium which aims to facilitate the rapid growth of hardware-based security research and development. Another goal of this conference is to help build hardware security community in Asian and Pacific area.
Hardware has long been viewed as a trusted party supporting the whole computer system and is often treated as an abstract layer running instructions passed through the software layer. Historically, cybersecurity community believed that the integrated circuit (IC) supply chain is well protected. However, the IC supply chain, which is now spread around the globe, has become more vulnerable to attacks than before. The heavy reliance on third-party resources/services breeds security concerns and invalidates the illusion that attackers cannot easily access the isolated IC supply chain. Formal methods have been proven to be effective in security verification on hardware code. Trustworthy hardware is also under development for the construction of the root-of-trust. The intrinsic properties of existing and emerging devices, MOSFET, memristor, spintronics, etc. are leveraged for security primitives and applications. Another trend in the hardware security area is the development of security enhanced hardware infrastructure for system level protection. The goal is to provide a fully operational software and hardware platform that ensures secure design, manufacturing, and deployment of modern computer systems.
MORE
Accepted Papers:
- Jeroen Delvaux, Dawu Gu and Ingrid Verbauwhede. Upper Bounds on The Min-Entropy of RO Sum, Arbiter, FeedForward Arbiter, and S-ArbRO PUFs
- Senwen Kan and Jennifer Dworak. Echeloned IJTAG Data Protection
- Yue Zheng, Yuan Cao and Chip Hong Chang. A New Event-driven Dynamic Vision Sensor based Physical Unclonable Function for Camera Authentication in Reactive Monitoring System
- Joshua Mead, Christophe Bobda and Taylor Whitaker. Defeating Drone Jamming With Hardware Sandboxing
- Pushpita Roy and Ansuman Banerjee. A New Approach for RootCausing Attacks on Digital Microfluidic Devices
- Poulami Das, Debapriya Basu Roy, Harishma Boyapally and Debdeep Mukhopadhyay. Inner Collisions in ECC: Vulnerabilities of Complete Addition Formulas for NIST Curves
- Mehran Mozaffari Kermani, Reza Azarderakhsh and Jiafeng Xie. Error Detection Reliable Architectures of Camellia Block Cipher Applicable to Different Variants of its Substitution Boxes
- Zimu Guo, Mark Tehranipoor and Domenic Forte. Aging Attacks for Key Extraction on Permutation-Based Obfuscation
- Junichi Sakamoto, Daisuke Fujimoto and Tsutomu Matsumoto. Laser irradiation on EEPROM sense amplifiers enhances side-channel leakage of the bits being read
- Md Badruddoja Majumder, Mesbah Uddin, Jeyavijayan Rajendran and Garrett Rose. Sneak Path Enabled Authentication for Memristive Crossbar Memories
- Mingfu Xue, Jian Wang and Aiqun Hu. An Enhanced Classification-based Golden Chips-Free Hardware Trojan Detection Technique
- SyingJyan Wang, JhihYu Wei, ShihHeng Huang and Katherine Shu-Min Li. Test Generation for Combinational Hardware Trojans
- Sami Saab, Andy Leiserson and Michael Tunstall. Key Extraction from the Primary Side of a Switched-Mode Power Supply
- Aesun Park and Dong-Guk Han. Chosen Ciphertext Simple Power Analysis on Software 8-bit Implementation of Ring-LWE Encryption
- Yuan Cao, Le Zhang and Chip Hong Chang. Using Image Sensor PUF as Root of Trust for Birthmarking of Perceptual Image Hash
- Kohei Matsuda, Noriyuki Miura, Makoto Nagata, YuIchi Hayashi, Tatsuya Fujii and Kazuo Sakiyama. On-Chip Substrate-Bounce Monitoring for Laser-Fault Countermeasure
- Liran Lerman, Olivier Markowitch and Nikita Veshchikov. Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks
- Md Tauhidur Rahman, Domenic Forte, Xiaoxiao Wang and Mark Tehranipoor. Enhancing Noise Sensitivity of Embedded SRAMs for Robust True Random Number Generation in SoCs
- Travis Schulze, Kevin Kwiat, Charles Kamhoua and Yiyu Shi. RECORD: Temporarily Randomized Encoding of Combinational Logic for Resistance to Data Leakage from Hardware Trojan
- Syed Rafay Hasan, Charles Kamhoua, Kevin Kwiat and Laurent Njilla. Translating Circuit Behavior Manifestations of Hardware Trojans using Model Checkers into Run-time Trojan Detection Monitors
- Jing Ye, Yu Hu and Xiaowei Li. RPUF: Physical Unclonable Function with Randomized Challenge to Resist Modeling Attack
- Jiadong Wang, Aijiao Cui, Mengyang Li, Gang Qu and Huawei Li. An Ultra-low Overhead LUT-based PUF for FPGA
- Jaya Dofe, Chen Yan, Scott Kontak, Emre Salman and Qiaoyan Yu. Transistor-Level Camouflaged Logic Locking Method for Monolithic 3D IC Security
- Zhang Chen, Pingqiang Zhou, Tsung-Yi Ho and Yier Jin. How Secure is Split Manufacturing in Preventing Hardware Trojan?