{"title":"Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications","authors":"Sikhar Patranabis, Debapriya Basu Roy, Anirban Chakraborty, Naveen Nagar, Astikey Singh, Debdeep Mukhopadhyay, Santosh K. Ghosh","doi":"10.1007/s41635-018-0049-y","DOIUrl":"https://doi.org/10.1007/s41635-018-0049-y","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"9 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132546041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Security Implications of Reliability, Remanence, and Recovery in Embedded Memory","authors":"S. Skorobogatov","doi":"10.1007/s41635-018-0050-5","DOIUrl":"https://doi.org/10.1007/s41635-018-0050-5","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125668270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring RFC 7748 for Hardware Implementation: Curve25519 and Curve448 with Side-Channel Protection","authors":"Pascal Sasdrich, T. Güneysu","doi":"10.1007/s41635-018-0048-z","DOIUrl":"https://doi.org/10.1007/s41635-018-0048-z","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132386022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses","authors":"Jakub Szefer","doi":"10.1007/s41635-018-0046-1","DOIUrl":"https://doi.org/10.1007/s41635-018-0046-1","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123374932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SRASA: a Generalized Theoretical Framework for Security and Reliability Analysis in Computing Systems","authors":"Lake Bu, Jaya Dofe, Qiaoyan Yu, M. Kinsy","doi":"10.1007/s41635-018-0047-0","DOIUrl":"https://doi.org/10.1007/s41635-018-0047-0","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115582110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Travis Meade, Kaveh Shamsi, Thao Le, J. Di, Shaojie Zhang, Yier Jin
{"title":"The Old Frontier of Reverse Engineering: Netlist Partitioning","authors":"Travis Meade, Kaveh Shamsi, Thao Le, J. Di, Shaojie Zhang, Yier Jin","doi":"10.1007/s41635-018-0043-4","DOIUrl":"https://doi.org/10.1007/s41635-018-0043-4","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133923872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Past, Present, and Future of Physical Security Enclosures: From Battery-Backed Monitoring to PUF-Based Inherent Security and Beyond","authors":"J. Obermaier, Vincent Immler","doi":"10.1007/s41635-018-0045-2","DOIUrl":"https://doi.org/10.1007/s41635-018-0045-2","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134474648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Keshavarz, Cunxi Yu, S. Ghandali, Xiaolin Xu, Daniel E. Holcomb
{"title":"Survey on Applications of Formal Methods in Reverse Engineering and Intellectual Property Protection","authors":"S. Keshavarz, Cunxi Yu, S. Ghandali, Xiaolin Xu, Daniel E. Holcomb","doi":"10.1007/s41635-018-0044-3","DOIUrl":"https://doi.org/10.1007/s41635-018-0044-3","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132080209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vidya Govindan, R. Chakraborty, Pranesh Santikellur, A. Chaudhary
{"title":"A Hardware Trojan Attack on FPGA-Based Cryptographic Key Generation: Impact and Detection","authors":"Vidya Govindan, R. Chakraborty, Pranesh Santikellur, A. Chaudhary","doi":"10.1007/s41635-018-0042-5","DOIUrl":"https://doi.org/10.1007/s41635-018-0042-5","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131275473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Medical Devices Against Hardware Trojan Attacks Through Analog-, Digital-, and Physiological-Based Signatures","authors":"Taimour Wehbe, V. Mooney, O. Inan, D. Keezer","doi":"10.1007/s41635-018-0040-7","DOIUrl":"https://doi.org/10.1007/s41635-018-0040-7","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123181570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}