Login / Signup
WESS
2009
2012
2015
2009
2015
Keyphrases
Publications
2015
Taimour Wehbe
,
Vincent John Mooney
,
David C. Keezer
,
Nicholas B. Parham
A Novel Approach to Detect Hardware Trojan Attacks on Primary Data Inputs.
WESS
(2015)
Christian Krieg
,
Daniel Neubacher
CHEF: A Configurable Hardware Trojan Evaluation Framework.
WESS
(2015)
Ermis Papastefanakis
,
Bruno Maitre
,
Dominique Ragot
Security Challenges in ManyCore Embedded Systems based on Networks-on-Chip (NoCs).
WESS
(2015)
Paula Vasile
,
Bogdan Groza
,
Pal-Stefan Murvay
Performance analysis of broadcast authentication protocols on CAN-FD and FlexRay.
WESS
(2015)
Sixing Lu
,
Roman Lysecky
Analysis of Control Flow Events for Timing-based Runtime Anomaly Detection.
WESS
(2015)
Omaimah Omar Bamasag
,
Kamal Youcef-Toumi
Towards Continuous Authentication in Internet of Things Based on Secret Sharing Scheme.
WESS
(2015)
Jakub Breier
,
Dirmanto Jap
Testing Feasibility of Back-Side Laser Fault Injection on a Microcontroller.
WESS
(2015)
Proceedings of the 10th Workshop on Embedded Systems Security, WESS 2015, Amsterdam, The Netherlands, October 8, 2015
WESS
(2015)
Anju P. Johnson
,
Rajat Subhra Chakraborty
,
Debdeep Mukhopadhyay
A Novel Attack on a FPGA based True Random Number Generator.
WESS
(2015)
Muhammad Taimoor Khan
,
Anastasios Fragopoulos
,
Dimitrios N. Serpanos
,
Howard E. Shrobe
Abstract Data Machine: Data Classifier for Reliable Embedded Systems Software.
WESS
(2015)
Pedro Malagón
,
Juan-Mariano de Goyeneche
,
David Fraga
,
José Manuel Moya
Bitslice software implementation of KeeLoq as a side-channel countermeasure.
WESS
(2015)
2014
Xuan Thuy Ngo
,
Sylvain Guilley
,
Shivam Bhasin
,
Jean-Luc Danger
,
Zakaria Najm
Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horses.
WESS
(2014)
João Amaral
,
Francesco Regazzoni
,
Pedro Tomás
,
Ricardo Chaves
Accelerating differential power analysis on heterogeneous systems.
WESS
(2014)
Aderinola Gbade-Alabi
,
David C. Keezer
,
Vincent John Mooney
,
Axel York Poschmann
,
Marc Stöttinger
,
Kshitij Divekar
A signature based architecture for Trojan detection.
WESS
(2014)
Debasri Saha
,
Susmita Sur-Kolay
Trusted sharing of intellectual property in electronic hardware design.
WESS
(2014)
Anju P. Johnson
,
Sayandeep Saha
,
Rajat Subhra Chakraborty
,
Debdeep Mukhopadhyay
,
Sezer Gören
Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet.
WESS
(2014)
Marilyn Wolf
,
Saibal Mukhopadhyay
Information theoretic models for signatures in VLSI power delivery systems.
WESS
(2014)
Bodhisatwa Mazumdar
Some RSSB constructions with improved resistance towards differential power analysis.
WESS
(2014)
Andreas Papalambrou
,
Kyriakos Stefanidis
,
John V. Gialelis
,
Dimitrios N. Serpanos
Detection, traceback and filtering of denial of service attacks in networked embedded systems.
WESS
(2014)
Proceedings of the 9th Workshop on Embedded Systems Security, WESS '14, New Delhi, India, October 17, 2014
WESS
(2014)
Oscar M. Guillen
,
Ralf Brederlow
,
Ralph Ledwa
,
Georg Sigl
Risk management in embedded devices using metering applications as example.
WESS
(2014)
2013
Aydin Aysu
,
Nahid Farhady Ghalaty
,
Zane R. Franklin
,
Moein Pahlavan Yali
,
Patrick Schaumont
Digital fingerprints for low-cost platforms using MEMS sensors.
WESS
(2013)
Valentina Banciu
,
Simon Hoerder
,
Dan Page
Light-weight primitive, feather-weight security: a cryptanalytic knock-out.
WESS
(2013)
Sebastian Kutzner
,
Axel York Poschmann
,
Marc Stöttinger
Hardware trojan design and detection: a practical evaluation.
WESS
(2013)
Andrea Höller
,
Christopher Preschern
,
Christian Steger
,
Christian Kreiner
,
Armin Krieg
,
Holger Bock
,
Josef Haid
Automatized high-level evaluation of security properties for RTL hardware designs.
WESS
(2013)
Gangqiang Yang
,
Xinxin Fan
,
Mark D. Aagaard
,
Guang Gong
Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs.
WESS
(2013)
Arash Vahidi
,
Christopher Jämthagen
Secure RPC in embedded systems: evaluation of some GlobalPlatform implementation alternatives.
WESS
(2013)
Proceedings of the Workshop on Embedded Systems Security, WESS 2013, Montreal, Quebec, Canada, September 29 - October 4, 2013
WESS
(2013)
Shivam Bhasin
,
Jean-Luc Danger
,
Sylvain Guilley
,
Zakaria Najm
A low-entropy first-degree secure provable masking scheme for resource-constrained devices.
WESS
(2013)
Michal Parusinski
,
Saloomeh Shariati
,
Dina Kamel
,
François-Xavier Standaert
Strong PUFs and their (physical) unpredictability: a case study with power PUFs.
WESS
(2013)
2010
Slobodan Lukovic
,
Nikolaos Christianos
Enhancing network-on-chip components to support security of processing elements.
WESS
(2010)
Ted Huffmire
,
Timothy E. Levin
,
Michael Bilzor
,
Cynthia E. Irvine
,
Jonathan Valamehr
,
Mohit Tiwari
,
Timothy Sherwood
,
Ryan Kastner
Hardware trust implications of 3-D integration.
WESS
(2010)
Alessandro Barenghi
,
Luca Breveglieri
,
Israel Koren
,
Gerardo Pelosi
,
Francesco Regazzoni
Countermeasures against fault attacks on software implemented AES: effectiveness and cost.
WESS
(2010)
Abdourhamane Idrissa
,
Alain Aubert
,
Thierry Fournel
,
Viktor Fischer
Secure protocols for serverless remote product authentication.
WESS
(2010)
Edgar Mateos
,
Catherine H. Gebotys
A new correlation frequency analysis of the side channel.
WESS
(2010)
Ambuj Sinha
,
Zhimin Chen
,
Patrick Schaumont
A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software.
WESS
(2010)
Luis Angel D. Bathen
,
Nikil D. Dutt
PoliMakE: a policy making engine for secure embedded software execution on chip-multiprocessors.
WESS
(2010)
Nevine Maurice Ebeid
,
Rob Lambert
A new CRT-RSA algorithm resistant to powerful fault attacks.
WESS
(2010)
Shivam Bhasin
,
Sylvain Guilley
,
Florent Flament
,
Nidhal Selmane
,
Jean-Luc Danger
Countering early evaluation: an approach towards robust dual-rail precharge logic.
WESS
(2010)
Leandro Fiorin
,
Alberto Ferrante
,
Konstantinos Padarnitsas
,
Stefano Carucci
Hardware-assisted security enhanced Linux in embedded systems: a proposal.
WESS
(2010)
Dominik Merli
,
Frederic Stumpf
,
Claudia Eckert
Improving the quality of ring oscillator PUFs on FPGAs.
WESS
(2010)
Christopher Szilagyi
,
Philip Koopman
Low cost multicast authentication via validity voting in time-triggered embedded control networks.
WESS
(2010)
Proceedings of the 5th Workshop on Embedded Systems Security, WESS 2010, Scottsdale, AZ, USA, October 24, 2010
WESS
(2010)
2009
Juan Carlos Martínez Santos
,
Yunsi Fei
,
Zhijie Jerry Shi
PIFT: efficient dynamic information flow tracking using secure page allocation.
WESS
(2009)
Ahmadou Al Khary Séré
,
Julien Iguchi-Cartigny
,
Jean-Louis Lanet
Automatic detection of fault attack and countermeasures.
WESS
(2009)
Ilya Kizhvatov
Side channel analysis of AVR XMEGA crypto engine.
WESS
(2009)
Jörg Brauer
,
Bastian Schlich
,
Thomas Reinbacher
,
Stefan Kowalewski
Stack bounds analysis for microcontroller assembly code.
WESS
(2009)
Miroslav Knezevic
,
Ingrid Verbauwhede
Hardware evaluation of the Luffa hash family.
WESS
(2009)
Philipp Grabher
,
Johann Großschädl
,
Dan Page
Non-deterministic processors: FPGA-based analysis of area, performance and security.
WESS
(2009)
Proceedings of the 4th Workshop on Embedded Systems Security, WESS 2009, Grenoble, France, October 15, 2009
WESS
(2009)