Login / Signup
IVSW
2016
2019
2016
2019
Keyphrases
Publications
2019
Arash Nejat
,
Zahra Kazemi
,
Vincent Beroulle
,
David Hély
,
Mahdi Fazeli
Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection.
IVSW
(2019)
Yildiran Yilmaz
,
Basel Halak
A Two-Flights Mutual Authentication for Energy-Constrained IoT Devices.
IVSW
(2019)
Haibo Su
,
Basel Halak
,
Mark Zwolinski
Two-Stage Architectures for Resilient Lightweight PUFs.
IVSW
(2019)
Batya Karp
,
Ofer Amrani
,
Osnat Keren
Nonlinear Product Codes for Reliability and Security.
IVSW
(2019)
Miao Yu
,
Basel Halak
,
Mark Zwolinski
Using Hardware Performance Counters to Detect Control Hijacking Attacks.
IVSW
(2019)
Zacharias Takakis
,
Dimitrios Mangiras
,
Chrysostomos Nicopoulos
,
Giorgos Dimitrakopoulos
Dynamic Adjustment of Test-Sequence Duration for Increasing the Functional Coverage.
IVSW
(2019)
Ali Shuja Siddiqui
,
Geraldine Shirley
,
Shreya Bendre
,
Girija Bhagwat
,
Jim Plusquellic
,
Fareena Saqib
Secure Design Flow of FPGA Based RISC-V Implementation.
IVSW
(2019)
Honorio Martín
,
Elena Ioana Vatajelu
,
Giorgio Di Natale
,
Osnat Keren
On the Reliability of the Ring Oscillator Physically Unclonable Functions.
IVSW
(2019)
Aayush Singla
,
Bernhard Lippmann
,
Helmut Graeb
Verification of Physical Chip Layouts Using GDSII Design Data.
IVSW
(2019)
Zahra Kazemi
,
Athanasios Papadimitriou
,
Ioanna Souvatzoglou
,
Ehsan Aerabi
,
Mosabbah Mushir Ahmed
,
David Hély
,
Vincent Beroulle
On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems: Clock Glitch Attacks.
IVSW
(2019)
Marc Merandat
,
Vincent Reynaud
,
Emanuele Valea
,
Jérôme Quévremont
,
Nicolas Valette
,
Paolo Maistri
,
Régis Leveugle
,
Marie-Lise Flottes
,
Sophie Dupuis
,
Bruno Rouzeyre
,
Giorgio Di Natale
A Comprehensive Approach to a Trusted Test Infrastructure.
IVSW
(2019)
Nan Du
,
Mahdi Kiani
,
Xianyue Zhao
,
Danilo Bürger
,
Oliver G. Schmidt
,
Ramona Ecke
,
Stefan E. Schulz
,
Heidemarie Schmidt
,
Ilia Polian
Electroforming-free Memristors for Hardware Security Primitives.
IVSW
(2019)
4th IEEE International Verification and Security Workshop, IVSW 2019, Rhodes Island, Greece, July 1-3, 2019
IVSW
(2019)
2018
Michael Werner
,
Bernhard Lippmann
,
Johanna Baehr
,
Helmut Gräb
Reverse Engineering of Cryptographic Cores by Structural Interpretation Through Graph Analysis.
IVSW
(2018)
Thao Le
,
Lucas Weaver
,
Jia Di
,
Shaojie Zhang
,
Yier Jin
Hardware Trojan Detection and Functionality Determination for Soft IPs.
IVSW
(2018)
Rolf Drechsler
,
Christoph Lüth
,
Görschwin Fey
,
Tim Güneysu
Towards Self-Explaining Digital Systems: A Design Methodology for the Next Generation.
IVSW
(2018)
Haibo Su
,
Mark Zwolinski
,
Basel Halak
A Machine Learning Attacks Resistant Two Stage Physical Unclonable Functions Design.
IVSW
(2018)
Amira Elhamshary
,
Yehea Ismail
,
Said Elkhamy
Security Analysis of Chaotic Baker Maps.
IVSW
(2018)
Rolf Drechsler
Keynotes: Towards Self-Explaining Digital Systems: A Design Methodology for the Next Generation.
IVSW
(2018)
Adam Hastings
,
Sean Jensen
,
Jeffrey Goeders
,
Brad L. Hutchings
Using Physical and Functional Comparisons to Assure 3rd-Party IP for Modern FPGAs.
IVSW
(2018)
Alessandro Barenghi
,
Luca Breveglieri
,
Niccolò Izzo
,
Gerardo Pelosi
Software-only Reverse Engineering of Physical DRAM Mappings for Rowhammer Attacks.
IVSW
(2018)
Maoyuan Qin
,
Wei Hu
,
Dejun Mu
,
Yu Tai
Property Based Formal Security Verification for Hardware Trojan Detection.
IVSW
(2018)
Sofiane Takarabt
,
Kais Chibani
,
Adrien Facon
,
Sylvain Guilley
,
Yves Mathieu
,
Laurent Sauvage
,
Youssef Souissi
Pre-silicon Embedded System Evaluation as New EDA Tool for Security Verification.
IVSW
(2018)
Yildiran Yilmaz
,
Steve R. Gunn
,
Basel Halak
Lightweight PUF-Based Authentication Protocol for IoT Devices.
IVSW
(2018)
Andrea Marcelli
,
Ernesto Sánchez
,
Luca Sasselli
,
Giovanni Squillero
On the Mitigation of Hardware Trojan Attacks in Embedded Processors by Exploiting a Hardware-Based Obfuscator.
IVSW
(2018)
Mathieu Da Silva
,
Emanuele Valea
,
Marie-Lise Flottes
,
Sophie Dupuis
,
Giorgio Di Natale
,
Bruno Rouzeyre
A New Secure Stream Cipher for Scan Chain Encryption.
IVSW
(2018)
3rd IEEE International Verification and Security Workshop, IVSW 2018, Costa Brava, Spain, July 2-4, 2018
IVSW
(2018)
Mosabbah Mushir Ahmed
,
David Hély
,
Etienne Perret
,
Nicolas Barbot
,
Romain Siragusa
,
Maxime Bernier
,
Frédéric Garet
Authentication of Microcontroller Board Using Non-Invasive EM Emission Technique.
IVSW
(2018)
Zahra Kazemi
,
Athanasios Papadimitriou
,
David Hély
,
Mahdi Fazeli
,
Vincent Beroulle
Hardware Security Evaluation Platform for MCU-Based Connected Devices: Application to Healthcare IoT.
IVSW
(2018)
M. Tanjidur Rahman
,
Qihang Shi
,
Shahin Tajik
,
Hao-Ting Shen
,
Damon L. Woodard
,
Mark M. Tehranipoor
,
Navid Asadizanjani
Physical Inspection & Attacks: New Frontier in Hardware Security.
IVSW
(2018)
Shakil Mahmud
,
Brooks Olney
,
Robert Karam
Architectural Diversity: Bio-Inspired Hardware Security for FPGAs.
IVSW
(2018)
Adrien Facon
,
Sylvain Guilley
,
Matthieu Lec'Hvien
,
Alexander Schaub
,
Youssef Souissi
Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms.
IVSW
(2018)
2017
Seyed-Abdollah Aftabjahani
,
Amitabh Das
Robust secure design by increasing the resilience of Attack Protection Blocks.
IVSW
(2017)
Erwan Fabiani
,
Loïc Lagadec
,
Mohamed Ben Hammouda
,
Ciprian Teodorov
Asserting causal properties in High Level Synthesis.
IVSW
(2017)
Giorgio Di Natale
,
Marie-Lise Flottes
,
Sophie Dupuis
,
Bruno Rouzeyre
Hacking the Control Flow error detection mechanism.
IVSW
(2017)
Eli Weintraub
Estimating Target Distribution in security assessment models.
IVSW
(2017)
IEEE 2nd International Verification and Security Workshop, IVSW 2017, Thessaloniki, Greece, July 3-5, 2017
IVSW
(2017)
Debapriya Basu Roy
,
Shivam Bhasin
,
Ivica Nikolic
,
Debdeep Mukhopadhyay
Opening pandora's box: Implication of RLUT on secure FPGA applications and IP security.
IVSW
(2017)
Cyril Bresch
,
Adrien Michelet
,
Laurent Amato
,
Thomas Meyer
,
David Hély
A red team blue team approach towards a secure processor design with hardware shadow stack.
IVSW
(2017)
Mohd Syafiq Mispan
,
Basel Halak
,
Mark Zwolinski
Lightweight obfuscation techniques for modeling attacks resistant PUFs.
IVSW
(2017)
David McCann
,
Elisabeth Oswald
Practical evaluation of masking software countermeasures on an IoT processor.
IVSW
(2017)
Jan Burchard
,
Ange-Salomé Messeng Ekossono
,
Jan Horácek
,
Mael Gay
,
Bernd Becker
,
Tobias Schubert
,
Martin Kreuzer
,
Ilia Polian
Towards mixed structural-functional models for algebraic fault attacks on ciphers.
IVSW
(2017)
Elena Ioana Vatajelu
,
Giorgio Di Natale
,
Paolo Prinetto
Zero bit-error-rate weak PUF based on Spin-Transfer-Torque MRAM memories.
IVSW
(2017)
Evan Chavis
,
Harrison Davis
,
Yijun Hou
,
Matthew Hicks
,
Salessawi Ferede Yitbarek
,
Todd M. Austin
,
Valeria Bertacco
SNIFFER: A high-accuracy malware detector for enterprise-based systems.
IVSW
(2017)
Bozena Kaminska
,
Jasbir N. Patel
,
Hao Jiang
Secure authentication of electronic systems with autonomous optical nano-devices.
IVSW
(2017)
Marc Fyrbiak
,
Sebastian Strauss
,
Christian Kison
,
Sebastian Wallat
,
Malte Elson
,
Nikol Rummel
,
Christof Paar
Hardware reverse engineering: Overview and open challenges.
IVSW
(2017)
Steve Trimberger
,
Steve McNeil
Security of FPGAs in data centers.
IVSW
(2017)
Gregoire Gimenez
,
Abdelkarim Cherkaoui
,
Raphael Frisch
,
Laurent Fesquet
Self-timed Ring based True Random Number Generator: Threat model and countermeasures.
IVSW
(2017)
Padelis Papadopoulos
,
Anand Raman
,
Yorgos Koutsoyannopoulos
,
Nikolas Provatas
,
Magdy Abadir
Challenges and trends in SOC Electromagnetic (EM) Crosstalk.
IVSW
(2017)
Sebastian Wallat
,
Marc Fyrbiak
,
Moritz Schlögel
,
Christof Paar
A look at the dark side of hardware reverse engineering - a case study.
IVSW
(2017)