A Chaos-Based Complex Micro-instruction Set for Mitigating Instruction Reverse Engineering Md Sakib HasanMd Badruddoja MajumderGarrett S. Rose OriginalPaper 29 November 2019 Pages: 69 - 85
“S-Box” Implementation of AES Is Not Side Channel Resistant Ashokkumar C.Bholanath RoyBernard L. Menezes OriginalPaper 05 December 2019 Pages: 86 - 97
A practical application of game theory to optimize selection of hardware Trojan detection strategies Jonathan GrafWhitney BatchelorPeter Athanas OriginalPaper Open access 28 December 2019 Pages: 98 - 119
Throughput/Area Efficient Implementation of Scalable Polynomial Basis Multiplication Bahram Rashidi OriginalPaper 02 January 2020 Pages: 120 - 135
USB-Watch: a Generalized Hardware-Assisted Insider Threat Detection Framework Kyle DenneyLeonardo BabunA. Selcuk Uluagac OriginalPaper 02 March 2020 Pages: 136 - 149
A Comparison of Backscattering, EM, and Power Side-Channels and Their Performance in Detecting Software and Hardware Intrusions Luong N. NguyenChia-Lin ChengAlenka Zajic OriginalPaper 14 March 2020 Pages: 150 - 165