Hardware Security Implications of Reliability, Remanence, and Recovery in Embedded Memory Sergei Skorobogatov OriginalPaper Open access 11 October 2018 Pages: 314 - 321
Exploring RFC 7748 for Hardware Implementation: Curve25519 and Curve448 with Side-Channel Protection Pascal SasdrichTim Güneysu OriginalPaper 26 September 2018 Pages: 297 - 313
Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications Sikhar PatranabisDebapriya Basu RoySantosh Ghosh OriginalPaper 26 September 2018 Pages: 103 - 131
Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses Jakub Szefer ReviewPaper 13 September 2018 Pages: 219 - 234
SRASA: a Generalized Theoretical Framework for Security and Reliability Analysis in Computing Systems Lake BuJaya DofeMichel A. Kinsy OriginalPaper 12 September 2018 Pages: 200 - 218
The Old Frontier of Reverse Engineering: Netlist Partitioning Travis MeadeKaveh ShamsiYier Jin OriginalPaper 10 September 2018 Pages: 201 - 213
The Past, Present, and Future of Physical Security Enclosures: From Battery-Backed Monitoring to PUF-Based Inherent Security and Beyond Johannes ObermaierVincent Immler OriginalPaper 15 August 2018 Pages: 289 - 296
Survey on Applications of Formal Methods in Reverse Engineering and Intellectual Property Protection Shahrzad KeshavarzCunxi YuDaniel Holcomb OriginalPaper 01 August 2018 Pages: 214 - 224
A Hardware Trojan Attack on FPGA-Based Cryptographic Key Generation: Impact and Detection Vidya GovindanRajat Subhra ChakrabortyAditya Kumar Chaudhary OriginalPaper 20 June 2018 Pages: 225 - 239
A Survey of Techniques for Improving Security of GPUs Sparsh MittalS. B. AbhinayaIrfan Ali OriginalPaper 19 June 2018 Pages: 266 - 285
Securing Medical Devices Against Hardware Trojan Attacks Through Analog-, Digital-, and Physiological-Based Signatures Taimour WehbeVincent J. MooneyDavid C. Keezer OriginalPaper 19 June 2018 Pages: 251 - 265
A Novel Counterfeit Detection Approach for Integrated Circuit Supply Chain Assurance Preston D. FrazierE. Thomas Gilmore IIIMohamed F. Chouikha OriginalPaper 19 June 2018 Pages: 240 - 250
Development and Evaluation of Hardware Obfuscation Benchmarks Sarah AmirBicky ShakyaDomenic Forte OriginalPaper Open access 04 June 2018 Pages: 142 - 161
Fault Attacks on Secure Embedded Software: Threats, Design, and Evaluation Bilgiday YucePatrick SchaumontMarc Witteman OriginalPaper 10 May 2018 Pages: 111 - 130
Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice Kejun ChenShuai ZhangYier Jin OriginalPaper 10 May 2018 Pages: 97 - 110
Surveying the Hardware Trojan Threat Landscape for the Internet-of-Things Vivek VenugopalanCameron D. Patterson OriginalPaper 30 April 2018 Pages: 131 - 141
The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA Debapriya Basu RoyShivam BhasinXuan Thuy Ngo OriginalPaper 26 March 2018 Pages: 162 - 178
A Survey of Techniques for Improving Security of Non-volatile Memories Sparsh MittalAhmed Izzat Alsalibi OriginalPaper 02 March 2018 Pages: 179 - 200
ESCALATION: Leveraging Logic Masking to Facilitate Path-Delay-Based Hardware Trojan Detection Methods Arash NejatDavid HelyVincent Beroulle OriginalPaper 20 February 2018 Pages: 83 - 96
Power Analysis Attack of an AES GPU Implementation Chao LuoYunsi FeiDavid Kaeli OriginalPaper 15 February 2018 Pages: 69 - 82
Manufacturing Supply Chain and Product Lifecycle Security in the Era of Industry 4.0 Sujit Rokka ChhetriSina FaeziMohammad Abdullah Al Faruque OriginalPaper 15 December 2017 Pages: 51 - 68
Guest Editorial: Security Challenges in the IoT Regime Sandip RayYier Jin EditorialNotes 12 December 2017 Pages: 297 - 297
Reducing Side-Channel Leakage of Encryption Engines Using Integrated Low-Dropout Voltage Regulators Arvind SinghMonodeep KarSaibal Mukhopadhyay OriginalPaper 01 December 2017 Pages: 340 - 355
Cross-Level Detection Framework for Attacks on Cyber-Physical Systems Brien CroteauDeepak KrishnankuttyNilanjan Banerjee OriginalPaper 28 November 2017 Pages: 356 - 369
TSensors Vision, Infrastructure and Security Challenges in Trillion Sensor Era Mahabubul AlamMark M. TehranipoorUjjwal Guin OriginalPaper 28 November 2017 Pages: 311 - 327
A Survey of Side-Channel Attacks on Caches and Countermeasures Yangdi LyuPrabhat Mishra OriginalPaper 27 November 2017 Pages: 33 - 50
Challenges and Opportunities in Analog and Mixed Signal (AMS) Integrated Circuit (IC) Security Md Mahbub AlamSreeja ChowdhuryDomenic Forte OriginalPaper 27 November 2017 Pages: 15 - 32
Replacing eFlash with STTRAM in IoTs: Security Challenges and Solutions Asmit DeMohammad Nasim Imtiaz KhanSwaroop Ghosh OriginalPaper 20 November 2017 Pages: 328 - 339
Attacks in Reality: the Limits of Concurrent Error Detection Codes Against Laser Fault Injection Jakub BreierWei HeAnupam Chattopadhyay OriginalPaper 19 October 2017 Pages: 298 - 310
Intrusion Detection in PLC-Based Industrial Control Systems Using Formal Verification Approach in Conjunction with Graphs Muluken HailesellasieSyed Rafay Hasan OriginalPaper 18 October 2017 Pages: 1 - 14
A Methodology for the Characterisation of Leakages in Combinatorial Logic Guido BertoniMarco MartinoliMaria Chiara Molteni OriginalPaper Open access 30 November 2017 Pages: 269 - 281
Two Efficient Fault-Based Attacks on CLOC and SILC Debapriya Basu RoyAvik ChakrabortiMridul Nandi OriginalPaper 12 December 2017 Pages: 252 - 268
Extensive Laser Fault Injection Profiling of 65 nm FPGA Jakub BreierWei HeChee Lip Gan OriginalPaper 01 September 2017 Pages: 237 - 251
A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs Amine MrabetNadia El-MrabetMohsen Machhout OriginalPaper 10 November 2017 Pages: 219 - 236
An Evaluation of Lightweight Block Ciphers for Resource-Constrained Applications: Area, Performance, and Security Rajat SadhukhanSikhar PatranabisSantosh Ghosh OriginalPaper 03 November 2017 Pages: 203 - 218
Editorial for the Special Issue in Journal of Hardware and Systems Security (HaSS) Based on Selected Papers from 6th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2016) Debdeep MukhopadhyayVishal Saraswat OriginalPaper 24 October 2017 Pages: 201 - 202
Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ Dhiman SahaSourya KakarlaDipanwita Roy Chowdhury OriginalPaper 01 August 2017 Pages: 282 - 296
Differential Fault Analysis of SHA-3 Under Relaxed Fault Models Pei LuoYunsi FeiA. Adam Ding OriginalPaper 25 August 2017 Pages: 156 - 172
Systematic Correlation and Cell Neighborhood Analysis of SRAM PUF for Robust and Unique Key Generation M. Tauhidur RahmanAlison HoseyMark Tehranipoor OriginalPaper 05 September 2017 Pages: 137 - 155
A Survey on Function and System Call Hooking Approaches Juan LopezLeonardo BabunA. Selcuk Uluagac OriginalPaper 21 September 2017 Pages: 114 - 136
S3CBench: Synthesizable Security SystemC Benchmarks for High-Level Synthesis Nandeesha VeerannaBenjamin Carrion Schafer OriginalPaper 31 August 2017 Pages: 103 - 113
Security Measures Against a Rogue Network-on-Chip Rajesh JayashankaraShrideviDean Michael AncajasSanghamitra Roy OriginalPaper 30 May 2017 Pages: 173 - 187
A Security Perspective on Battery Systems of the Internet of Things Anthony Bahadir LopezKorosh VatanparvarMohammad Abdullah Al Faruque OriginalPaper 10 May 2017 Pages: 188 - 199
Benchmarking of Hardware Trojans and Maliciously Affected Circuits Bicky ShakyaTony HeMark Tehranipoor OriginalPaper 10 April 2017 Pages: 85 - 102
Trace Buffer Attack on the AES Cipher Yuanwen HuangPrabhat Mishra OriginalPaper 20 April 2017 Pages: 68 - 84
Trust Filter: Runtime Hardware Trojan Detection in Behavioral MPSoCs Nandeesha VeerannaBenjamin Carrion Schafer OriginalPaper 18 April 2017 Pages: 56 - 67
Security Assurance Guidance for Third-Party IP Brent ShermanMike BorzaCharles Qi OriginalPaper Open access 07 April 2017 Pages: 38 - 55
Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication Yunxi GuoAkhilesh Tyagi OriginalPaper 30 May 2017 Pages: 18 - 37
Fault Tolerant Infective Countermeasure for AES Sikhar PatranabisAbhishek ChakrabortyDebdeep Mukhopadhyay OriginalPaper 27 April 2017 Pages: 3 - 17
Editorial for the Introductory Issue of the Journal of Hardware and Systems Security (HaSS) Swarup BhuniaMark Tehranipoor Editorial 01 June 2017 Pages: 1 - 2