Search Results - "2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"

Refine Results
  1. 1

    DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage by Yu, Honggang, Ma, Haocheng, Yang, Kaichen, Zhao, Yiqiang, Jin, Yier

    “…Neural Network (NN) accelerators are currently widely deployed in various security-crucial scenarios, including image recognition, natural language processing…”
    Get full text
    Conference Proceeding
  2. 2

    The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes by Rahman, M Tanjidur, Tajik, Shahin, Rahman, M Sazadur, Tehranipoor, Mark, Asadizanjani, Navid

    “…Logic locking has been proposed as an obfuscation technique to protect outsourced IC designs from IP piracy by untrusted entities in the design and fabrication…”
    Get full text
    Conference Proceeding
  3. 3

    MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection by Dubey, Anuj, Cammarota, Rosario, Aysu, Aydin

    “…Differential Power Analysis (DPA) has been an active area of research for the past two decades to study the attacks for extracting secret information from…”
    Get full text
    Conference Proceeding
  4. 4

    CPU and GPU Accelerated Fully Homomorphic Encryption by Morshed, Toufique, Aziz, Md Momin Al, Mohammed, Noman

    “…Fully Homomorphic Encryption (FHE) is one of the most promising technologies for privacy protection as it allows an arbitrary number of function computations…”
    Get full text
    Conference Proceeding
  5. 5

    PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance by Arsath K F, Muhammad, Ganesan, Vinod, Bodduna, Rahul, Rebeiro, Chester

    “…The power consumption of a microprocessor is a huge channel for information leakage. While the most popular exploitation of this channel is to recover…”
    Get full text
    Conference Proceeding
  6. 6

    Latch-Based Logic Locking by Sweeney, Joseph, Mohammed Zackriya, V, Pagliarini, Samuel, Pileggi, Lawrence

    “…Globalization of IC manufacturing has led to increased security concerns, notably IP theft. Several logic locking techniques have been developed for protecting…”
    Get full text
    Conference Proceeding
  7. 7

    A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan Detection by Nguyen, Luong N., Yilmaz, Baki Berkay, Prvulovic, Milos, Zajic, Alenka

    “…Over the past few years, malicious hardware modifications, a.k.a. hardware Trojans (HT), have emerged as a major security threat because integrated circuit…”
    Get full text
    Conference Proceeding
  8. 8

    ReGDS: A Reverse Engineering Framework from GDSII to Gate-level Netlist by Rajarathnam, Rachel Selina, Lin, Yibo, Jin, Yier, Pan, David Z.

    “…With many fabless companies outsourcing integrated circuit (IC) fabrication, the extent of design information recoverable by any third-party foundry remains…”
    Get full text
    Conference Proceeding
  9. 9

    Lattice PUF: A Strong Physical Unclonable Function Provably Secure against Machine Learning Attacks by Wang, Ye, Xi, Xiaodan, Orshansky, Michael

    “…We propose a strong physical unclonable function (PUF) provably secure against machine learning (ML) attacks with both classical and quantum computers. Its…”
    Get full text
    Conference Proceeding
  10. 10

    Cryptographic Fault Diagnosis using VerFI by Arribas, Victor, Wegener, Felix, Moradi, Amir, Nikova, Svetla

    “…Historically, fault diagnosis for integrated circuits has singularly dealt with reliability concerns. In contrast, a cryptographic circuit needs to be…”
    Get full text
    Conference Proceeding
  11. 11

    Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level by Yao, Yuan, Kathuria, Tarun, Ege, Baris, Schaumont, Patrick

    “…Power-based side-channel leakage is a known problem in the design of security-centric electronic systems. As the complexity of modern systems rapidly increases…”
    Get full text
    Conference Proceeding
  12. 12

    Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm by Acharya, Rabin Yu, Chowdhury, Sreeja, Ganji, Fatemeh, Forte, Domenic

    “…Hardware intellectual property (IP) theft is a major issue in today's globalized supply chain. To address it, numerous logic locking and obfuscation techniques…”
    Get full text
    Conference Proceeding
  13. 13

    Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU by Karimi, Elmira, Fei, Yunsi, Kaeli, David

    “…GPUs are increasingly being used in security applications, especially for accelerating encryption/decryption. While GPUs are an attractive platform in terms of…”
    Get full text
    Conference Proceeding
  14. 14

    RS-Mask: Random Space Masking as an Integrated Countermeasure against Power and Fault Analysis by Ramezanpour, Keyvan, Ampadu, Paul, Diehl, William

    “…While modern masking schemes provide provable security against passive side-channel analysis (SCA), such as power analysis, single faults can be employed to…”
    Get full text
    Conference Proceeding
  15. 15

    Statistical Ineffective Fault Analysis of GIMLI by Gruber, Michael, Probst, Matthias, Tempelmeier, Michael

    “…Statistical Ineffective Fault Analysis (SIFA) was introduced as a new approach to attack block ciphers at CHES 2018. Since then, SIFA has proven to be a…”
    Get full text
    Conference Proceeding
  16. 16

    Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin by Bahar Talukder, B. M. S., Menon, Vineetha, Ray, Biswajit, Neal, Tempestt, Rahman, Md Tauhidur

    “…Due to the globalization in the semiconductor supply chain, counterfeit dynamic random-access memory (DRAM) chips/modules have been spreading worldwide at an…”
    Get full text
    Conference Proceeding
  17. 17

    Encoding Power Traces as Images for Efficient Side-Channel Analysis by Hettwer, Benjamin, Horn, Tobias, Gehrer, Stefan, Guneysu, Tim

    “…Side-Channel Attacks (SCAs) are a powerful method to attack implementations of cryptographic algorithms. State-of-the-art techniques such as template attacks…”
    Get full text
    Conference Proceeding
  18. 18

    Going Deep: Using deep learning techniques with simplified mathematical models against XOR BR and TBR PUFs (Attacks and Countermeasures) by Khalafalla, Mahmoud, Elmohr, Mahmoud A., Gebotys, Catherine

    “…This paper contributes to the study of PUFs vulnerability against modeling attacks by evaluating the security of XOR BR PUFs, XOR TBR PUFs, and obfuscated…”
    Get full text
    Conference Proceeding
  19. 19

    A Post-Quantum Secure Discrete Gaussian Noise Sampler by Agrawal, Rashmi, Bu, Lake, Kinsy, Michel A.

    “…While the notion of achieving "quantum supremacy" may be debatable, rapid developments in the field of quantum computing are heading towards more realistic…”
    Get full text
    Conference Proceeding
  20. 20

    Secure Boot from Non-Volatile Memory for Programmable SoC Architectures by Streit, Franz-Josef, Fritz, Florian, Becher, Andreas, Wildermann, Stefan, Werner, Stefan, Schmidt-Korth, Martin, Pschyklenk, Michael, Teich, Jurgen

    “…In modern embedded systems, the trust in comprehensive security standards all along the product life cycle has become an increasingly important…”
    Get full text
    Conference Proceeding