A Framework for Hardware Trojan Vulnerability Estimation and Localization in RTL Designs Sheikh Ariful IslamLove Kumar SahSrinivas Katkoori OriginalPaper 27 August 2020 Pages: 246 - 262
Experimental Data Anomaly Detection at Edge Sensor Nodes Using Physics Laws Prudence PhillipsOlaide R. AfolabiHassan Salmani OriginalPaper 18 August 2020 Pages: 19 - 31
Physical Layer Encryption for Wireless OFDM Communication Systems Marko JacovicKyle JuretusKapil R. Dandekar OriginalPaper 23 July 2020 Pages: 230 - 245
User-Silicon Entangled Mobile Identity Authentication Timothy DeeRyan ScheelAkhilesh Tyagi OriginalPaper 02 July 2020 Pages: 208 - 229
Detecting Electromagnetic Injection Attack on FPGAs Using In-situ Timing Sensors Surabhi Satyajit GujarLeyla Nazhandali OriginalPaper 16 June 2020 Pages: 196 - 207
Cache-Zoomer: On-demand High-resolution Cache Monitoring for Security Hongyu FangSai Santosh DayapuleGuru Venkataramani OriginalPaper 07 June 2020 Pages: 180 - 195
Key Update Countermeasure for Correlation-Based Side-Channel Attacks Yutian GuiSuyash Mohan TamoreFareena Saqib OriginalPaper 30 May 2020 Pages: 167 - 179
A Comparison of Backscattering, EM, and Power Side-Channels and Their Performance in Detecting Software and Hardware Intrusions Luong N. NguyenChia-Lin ChengAlenka Zajic OriginalPaper 14 March 2020 Pages: 150 - 165
USB-Watch: a Generalized Hardware-Assisted Insider Threat Detection Framework Kyle DenneyLeonardo BabunA. Selcuk Uluagac OriginalPaper 02 March 2020 Pages: 136 - 149
Analysis of Dynamic Laser Injection and Quiescent Photon Emissions on an Embedded Processor Karim AminCatherine GebotysHaohao Liao OriginalPaper 24 February 2020 Pages: 55 - 67
Special Issue: 2019 PAINE Conference—Physical Assurance and Inspection of Electronics Navid AsadiMark Tehranipoor EditorialNotes 11 February 2020 Pages: 11 - 12
Deep Neural Network–Based Detection and Verification of Microelectronic Images Md Alimoor RezaZhenhua ChenDavid J. Crandall OriginalPaper 04 January 2020 Pages: 44 - 54
A Decomposition Workflow for Integrated Circuit Verification and Validation Adam KimuraJon SchollGlen David Via OriginalPaper 02 January 2020 Pages: 34 - 43
Throughput/Area Efficient Implementation of Scalable Polynomial Basis Multiplication Bahram Rashidi OriginalPaper 02 January 2020 Pages: 120 - 135
A practical application of game theory to optimize selection of hardware Trojan detection strategies Jonathan GrafWhitney BatchelorPeter Athanas OriginalPaper Open access 28 December 2019 Pages: 98 - 119
“S-Box” Implementation of AES Is Not Side Channel Resistant Ashokkumar C.Bholanath RoyBernard L. Menezes OriginalPaper 05 December 2019 Pages: 86 - 97
A Chaos-Based Complex Micro-instruction Set for Mitigating Instruction Reverse Engineering Md Sakib HasanMd Badruddoja MajumderGarrett S. Rose OriginalPaper 29 November 2019 Pages: 69 - 85
Chip-to-Chip Authentication Method Based on SRAM PUF and Public Key Cryptography Ioannis KarageorgosMehmet M. IsgencLarry Pileggi OriginalPaper Open access 26 November 2019 Pages: 382 - 396
An In-depth Study of MPU-Based Isolation Techniques Abderrahmane SensaouiOum-El-Kheir AktoufStephane Di Vito ReviewPaper 22 November 2019 Pages: 365 - 381
Analysis of Secure Caches Using a Three-Step Model for Timing-Based Attacks Shuwen DengWenjie XiongJakub Szefer OriginalPaper 20 November 2019 Pages: 397 - 425
Evaluation of Low-Cost Thermal Laser Stimulation for Data Extraction and Key Readout Thilo KrachenfelsHeiko LohrkeHeinz-Wilhelm Hübers OriginalPaper 20 November 2019 Pages: 24 - 33
Fluorescent X-ray Scan Image Quality Prediction Peter B. WeichmanEugene M. Lavely OriginalPaper Open access 15 November 2019 Pages: 13 - 23
Implementation-Based Design Fingerprinting for Robust IC Fraud Detection James SheyNaghmeh KarimiChintan Patel OriginalPaper 13 November 2019 Pages: 426 - 439
Blockchain in IoT: Current Trends, Challenges, and Future Roadmap Pinchen CuiUjjwal GuinDavid Umphress ReviewPaper 04 November 2019 Pages: 338 - 364
A New Adaptive Security Architecture with Extensible Computation Complexity for Generic Ciphers Prathap SiddavaatamReza Sedaghat OriginalPaper 08 October 2019 Pages: 319 - 337
Guest Editorial: Special Issue on Hardware Solutions for Cyber Security Michael VaiYunsi FeiRoger Khazan EditorialNotes 22 August 2019 Pages: 199 - 199
Malware Detection in Embedded Systems Using Neural Network Model for Electromagnetic Side-Channel Signals Haider Adnan KhanNader SehatbakhshAlenka Zajić OriginalPaper 22 August 2019 Pages: 305 - 318
External Monitoring Changes in Vehicle Hardware Profiles: Enhancing Automotive Cyber-Security Constantinos PatsakisKleanthis DelliosAgusti Solanas OriginalPaper 15 August 2019 Pages: 289 - 303
Robust and Noninvasive IC Authentication Using Radiated Electromagnetic Emissions Mosabbah Mushir AhmedDavid HelyFrederic Garet OriginalPaper 17 June 2019 Pages: 273 - 288
Design of Robust, High-Entropy Strong PUFs via Weightless Neural Network Leandro Santiago de AraújoVinay C. PatilSandip Kundu Original Research Article 22 May 2019 Pages: 235 - 249
Securing Wireless Communication via Hardware-Based Packet Obfuscation James ChackoKyle JuretusKapil R. Dandekar OriginalPaper 16 May 2019 Pages: 261 - 272
Automated Defective Pin Detection for Recycled Microelectronics Identification Pallabi GhoshAritra BhattacharyaRajat Subhra Chakraborty OriginalPaper 08 May 2019 Pages: 250 - 260
Practical Partial Hardware Reverse Engineering Analysis Franck Courbon OriginalPaper Open access 06 April 2019 Pages: 1 - 10
Targeted modification of hardware trojans Jason R. HamletJackson R. MayoVivian G. Kammler OriginalPaper 18 March 2019 Pages: 189 - 197
Public-Key Encryption with Integrated Keyword Search Vishal SaraswatRajeev Anand SahuOlivier Markowitch OriginalPaper 05 March 2019 Pages: 12 - 25
A Generalized Format Preserving Encryption Framework Using MDS Matrices Donghoon ChangMohona GhoshSomitra Kumar Sanadhya OriginalPaper 04 March 2019 Pages: 3 - 11
Guest Editorial SPACE 2017 Special Issue in the Journal of Hardware and Systems Security (HaSS) Sk Subidh AliDebdeep Mukhopadhyay EditorialNotes 23 March 2019 Pages: 1 - 2
Securing Data Center Against Power Attacks Rajesh JSChidhambaranathan RajamanikkamSanghamitra Roy OriginalPaper 05 February 2019 Pages: 177 - 188
Machine Learning-Based EDoS Attack Detection Technique Using Execution Trace Analysis Hossein AbbasiNaser Ezzati-JivanMichel R. Dagenais OriginalPaper 26 January 2019 Pages: 164 - 176
Spy Cartel: Parallelizing Evict+Time-Based Cache Attacks on Last-Level Caches Himanshi JainD. Anthony BalarajuChester Rebeiro OriginalPaper 12 January 2019 Pages: 147 - 163
Analysis of Diagonal Constants for Extension of Salsa to 64 Bit Bhagwan N. BatheBharti HariramaniS. V. Kulgod OriginalPaper 05 January 2019 Pages: 94 - 102
Hardware-Layer Intelligence Collection for Smart Grid Embedded Systems Charalambos KonstantinouMichail Maniatakos OriginalPaper 04 January 2019 Pages: 132 - 146
Detecting Hardware Trojans Inserted by Untrusted Foundry Using Physical Inspection and Advanced Image Processing Nidish VashisthaM. Tanjidur RahmanMark Tehranipoor OriginalPaper 13 December 2018 Pages: 333 - 344
IPA: an Instruction Profiling–Based Micro-architectural Side-Channel Attack on Block Ciphers Manaar AlamSarani BhattacharyaDebdeep Mukhopadhyay OriginalPaper 12 December 2018 Pages: 26 - 44
Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs—Extended Version Vincent ImmlerMatthias HillerAntonia Wachter-Zeh OriginalPaper 11 December 2018 Pages: 78 - 93
Guest Editorial: Hardware Reverse Engineering and Obfuscation Domenic ForteYousef Iskander Editorial 04 December 2018 Pages: 287 - 288
Large-Area Automated Layout Extraction Methodology for Full-IC Reverse Engineering Raul QuijadaRoger DuraFrancisco Serra-Graells OriginalPaper 31 October 2018 Pages: 322 - 332
Certain Observations on ACORN v3 and Grain v1—Implications Towards TMDTO Attacks Akhilesh Anilkumar SiddhantiSubhamoy MaitraNishant Sinha OriginalPaper 25 October 2018 Pages: 64 - 77
Unravelling Security Issues of Runtime Permissions in Android Efthimios AlepisConstantinos Patsakis OriginalPaper 25 October 2018 Pages: 45 - 63
Assessment of a Chip Backside Protection Elham AminiAnne BeyreutherChristian Boit OriginalPaper 17 October 2018 Pages: 345 - 352