The Old Frontier of Reverse Engineering: Netlist Partitioning Travis MeadeKaveh ShamsiYier Jin OriginalPaper 10 September 2018 Pages: 201 - 213
Survey on Applications of Formal Methods in Reverse Engineering and Intellectual Property Protection Shahrzad KeshavarzCunxi YuDaniel Holcomb OriginalPaper 01 August 2018 Pages: 214 - 224
A Hardware Trojan Attack on FPGA-Based Cryptographic Key Generation: Impact and Detection Vidya GovindanRajat Subhra ChakrabortyAditya Kumar Chaudhary OriginalPaper 20 June 2018 Pages: 225 - 239
A Novel Counterfeit Detection Approach for Integrated Circuit Supply Chain Assurance Preston D. FrazierE. Thomas Gilmore IIIMohamed F. Chouikha OriginalPaper 19 June 2018 Pages: 240 - 250
Securing Medical Devices Against Hardware Trojan Attacks Through Analog-, Digital-, and Physiological-Based Signatures Taimour WehbeVincent J. MooneyDavid C. Keezer OriginalPaper 19 June 2018 Pages: 251 - 265
A Survey of Techniques for Improving Security of GPUs Sparsh MittalS. B. AbhinayaIrfan Ali OriginalPaper 19 June 2018 Pages: 266 - 285