Search Results - "2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"
-
1
DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…Neural Network (NN) accelerators are currently widely deployed in various security-crucial scenarios, including image recognition, natural language processing…”
Get full text
Conference Proceeding -
2
The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…Logic locking has been proposed as an obfuscation technique to protect outsourced IC designs from IP piracy by untrusted entities in the design and fabrication…”
Get full text
Conference Proceeding -
3
MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…Differential Power Analysis (DPA) has been an active area of research for the past two decades to study the attacks for extracting secret information from…”
Get full text
Conference Proceeding -
4
CPU and GPU Accelerated Fully Homomorphic Encryption
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…Fully Homomorphic Encryption (FHE) is one of the most promising technologies for privacy protection as it allows an arbitrary number of function computations…”
Get full text
Conference Proceeding -
5
PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…The power consumption of a microprocessor is a huge channel for information leakage. While the most popular exploitation of this channel is to recover…”
Get full text
Conference Proceeding -
6
Latch-Based Logic Locking
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…Globalization of IC manufacturing has led to increased security concerns, notably IP theft. Several logic locking techniques have been developed for protecting…”
Get full text
Conference Proceeding -
7
A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan Detection
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…Over the past few years, malicious hardware modifications, a.k.a. hardware Trojans (HT), have emerged as a major security threat because integrated circuit…”
Get full text
Conference Proceeding -
8
ReGDS: A Reverse Engineering Framework from GDSII to Gate-level Netlist
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…With many fabless companies outsourcing integrated circuit (IC) fabrication, the extent of design information recoverable by any third-party foundry remains…”
Get full text
Conference Proceeding -
9
Lattice PUF: A Strong Physical Unclonable Function Provably Secure against Machine Learning Attacks
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…We propose a strong physical unclonable function (PUF) provably secure against machine learning (ML) attacks with both classical and quantum computers. Its…”
Get full text
Conference Proceeding -
10
Cryptographic Fault Diagnosis using VerFI
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…Historically, fault diagnosis for integrated circuits has singularly dealt with reliability concerns. In contrast, a cryptographic circuit needs to be…”
Get full text
Conference Proceeding -
11
Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…Power-based side-channel leakage is a known problem in the design of security-centric electronic systems. As the complexity of modern systems rapidly increases…”
Get full text
Conference Proceeding -
12
Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…Hardware intellectual property (IP) theft is a major issue in today's globalized supply chain. To address it, numerous logic locking and obfuscation techniques…”
Get full text
Conference Proceeding -
13
Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…GPUs are increasingly being used in security applications, especially for accelerating encryption/decryption. While GPUs are an attractive platform in terms of…”
Get full text
Conference Proceeding -
14
RS-Mask: Random Space Masking as an Integrated Countermeasure against Power and Fault Analysis
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…While modern masking schemes provide provable security against passive side-channel analysis (SCA), such as power analysis, single faults can be employed to…”
Get full text
Conference Proceeding -
15
Statistical Ineffective Fault Analysis of GIMLI
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…Statistical Ineffective Fault Analysis (SIFA) was introduced as a new approach to attack block ciphers at CHES 2018. Since then, SIFA has proven to be a…”
Get full text
Conference Proceeding -
16
Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…Due to the globalization in the semiconductor supply chain, counterfeit dynamic random-access memory (DRAM) chips/modules have been spreading worldwide at an…”
Get full text
Conference Proceeding -
17
Encoding Power Traces as Images for Efficient Side-Channel Analysis
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…Side-Channel Attacks (SCAs) are a powerful method to attack implementations of cryptographic algorithms. State-of-the-art techniques such as template attacks…”
Get full text
Conference Proceeding -
18
Going Deep: Using deep learning techniques with simplified mathematical models against XOR BR and TBR PUFs (Attacks and Countermeasures)
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…This paper contributes to the study of PUFs vulnerability against modeling attacks by evaluating the security of XOR BR PUFs, XOR TBR PUFs, and obfuscated…”
Get full text
Conference Proceeding -
19
A Post-Quantum Secure Discrete Gaussian Noise Sampler
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…While the notion of achieving "quantum supremacy" may be debatable, rapid developments in the field of quantum computing are heading towards more realistic…”
Get full text
Conference Proceeding -
20
Secure Boot from Non-Volatile Memory for Programmable SoC Architectures
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…In modern embedded systems, the trust in comprehensive security standards all along the product life cycle has become an increasingly important…”
Get full text
Conference Proceeding