Clément Gaine, J. Nikolovski, D. Aboulkassimi, J. Dutertre
{"title":"Active Shielding Against Physical Attacks by Observation and Fault Injection: ChaXa","authors":"Clément Gaine, J. Nikolovski, D. Aboulkassimi, J. Dutertre","doi":"10.1007/s41635-023-00131-5","DOIUrl":"https://doi.org/10.1007/s41635-023-00131-5","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122116611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aruna Jayasena, B. Kumar, Subodha Charles, Hasini Witharana, P. Mishra
{"title":"Network-on-Chip Trust Validation Using Security Assertions","authors":"Aruna Jayasena, B. Kumar, Subodha Charles, Hasini Witharana, P. Mishra","doi":"10.1007/s41635-022-00129-5","DOIUrl":"https://doi.org/10.1007/s41635-022-00129-5","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127477733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Erik J. Jorgensen, A. Kacmarcik, Milos Prvulović, A. Zajić
{"title":"Novel Feature Selection for Non-destructive Detection of Hardware Trojans Using Hyperspectral Scanning","authors":"Erik J. Jorgensen, A. Kacmarcik, Milos Prvulović, A. Zajić","doi":"10.1007/s41635-022-00127-7","DOIUrl":"https://doi.org/10.1007/s41635-022-00127-7","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116230912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A High-Speed, Long-Distance and Wall-Penetrating Covert Channel Based on EM Emanations from DRAM Clock","authors":"Zihao Zhan, Zhenkai Zhang, X. Koutsoukos","doi":"10.1007/s41635-022-00128-6","DOIUrl":"https://doi.org/10.1007/s41635-022-00128-6","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116587511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Swapnil Gade, Urbi Chatterjee, Debdeep Mukhopadhyay
{"title":"PAKAMAC: A PUF-based Keyless Automotive Entry System with Mutual Authentication","authors":"Swapnil Gade, Urbi Chatterjee, Debdeep Mukhopadhyay","doi":"10.1007/s41635-022-00126-8","DOIUrl":"https://doi.org/10.1007/s41635-022-00126-8","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115609648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing 3rd-Party HDL IP: a Feasibility Study Using Evolutionary Methods","authors":"Bayley King, Rashmi Jha, T. Kebede, David Kap","doi":"10.1007/s41635-022-00125-9","DOIUrl":"https://doi.org/10.1007/s41635-022-00125-9","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128391511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differential Fault Attack on Feistel-Based Sponge AE Schemes","authors":"Amit Jana","doi":"10.1007/s41635-022-00124-w","DOIUrl":"https://doi.org/10.1007/s41635-022-00124-w","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130337120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Geraldine Shirley Nicholas, A. Siddiqui, Sam Reji Joseph, Gregory Williams, F. Saqib
{"title":"A Secure Boot Framework with Multi-security Features and Logic-Locking Applications for Reconfigurable Logic","authors":"Geraldine Shirley Nicholas, A. Siddiqui, Sam Reji Joseph, Gregory Williams, F. Saqib","doi":"10.1007/s41635-021-00123-3","DOIUrl":"https://doi.org/10.1007/s41635-021-00123-3","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116295182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Analysis of Reconfigurable Cryptographic Primitives: TRNG and PUF","authors":"V. Rai, S. Tripathy, J. Mathew","doi":"10.1007/s41635-021-00120-6","DOIUrl":"https://doi.org/10.1007/s41635-021-00120-6","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114658023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Turning the Table: Using Bitstream Reverse Engineering to Detect FPGA Trojans","authors":"Wafi Danesh, Joshua Banago, Mostafizur Rahman","doi":"10.1007/s41635-021-00122-4","DOIUrl":"https://doi.org/10.1007/s41635-021-00122-4","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127798187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}