{"title":"ASSURE: A Hardware-Based Security Protocol for Resource-Constrained IoT Systems","authors":"Yıldıran Yılmaz, Leonardo Aniello, Basel Halak","doi":"10.1007/s41635-020-00102-0","DOIUrl":"https://doi.org/10.1007/s41635-020-00102-0","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131658479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Data Anomaly Detection at Edge Sensor Nodes Using Physics Laws","authors":"Prudence Phillips, Olaide R. Afolabi, H. Salmani","doi":"10.1007/s41635-020-00101-1","DOIUrl":"https://doi.org/10.1007/s41635-020-00101-1","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116421266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marko Jacovic, Kyle Juretus, Nagarajan Kandasamy, I. Savidis, K. Dandekar
{"title":"Physical Layer Encryption for Wireless OFDM Communication Systems","authors":"Marko Jacovic, Kyle Juretus, Nagarajan Kandasamy, I. Savidis, K. Dandekar","doi":"10.1007/s41635-020-00097-8","DOIUrl":"https://doi.org/10.1007/s41635-020-00097-8","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114743925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Timothy Dee, Ryan A. Scheel, Nicholas Montelibano, A. Tyagi
{"title":"User-Silicon Entangled Mobile Identity Authentication","authors":"Timothy Dee, Ryan A. Scheel, Nicholas Montelibano, A. Tyagi","doi":"10.1007/s41635-020-00098-7","DOIUrl":"https://doi.org/10.1007/s41635-020-00098-7","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132540753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Electromagnetic Injection Attack on FPGAs Using In-situ Timing Sensors","authors":"S. Gujar, L. Nazhandali","doi":"10.1007/s41635-020-00096-9","DOIUrl":"https://doi.org/10.1007/s41635-020-00096-9","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128979119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongyu Fang, Sai Santosh Dayapule, Fan Yao, M. Doroslovački, Guru Venkataramani
{"title":"Cache-Zoomer: On-demand High-resolution Cache Monitoring for Security","authors":"Hongyu Fang, Sai Santosh Dayapule, Fan Yao, M. Doroslovački, Guru Venkataramani","doi":"10.1007/s41635-020-00095-w","DOIUrl":"https://doi.org/10.1007/s41635-020-00095-w","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122806866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yutian Gui, Suyash Mohan Tamore, A. Siddiqui, F. Saqib
{"title":"Key Update Countermeasure for Correlation-Based Side-Channel Attacks","authors":"Yutian Gui, Suyash Mohan Tamore, A. Siddiqui, F. Saqib","doi":"10.1007/s41635-020-00094-x","DOIUrl":"https://doi.org/10.1007/s41635-020-00094-x","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114679663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luong N. Nguyen, Chia-Lin Cheng, Frank Werner, Milos Prvulović, A. Zajić
{"title":"A Comparison of Backscattering, EM, and Power Side-Channels and Their Performance in Detecting Software and Hardware Intrusions","authors":"Luong N. Nguyen, Chia-Lin Cheng, Frank Werner, Milos Prvulović, A. Zajić","doi":"10.1007/s41635-020-00093-y","DOIUrl":"https://doi.org/10.1007/s41635-020-00093-y","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117119292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"USB-Watch: a Generalized Hardware-Assisted Insider Threat Detection Framework","authors":"K. Denney, Leonardo Babun, A. Uluagac","doi":"10.1007/s41635-020-00092-z","DOIUrl":"https://doi.org/10.1007/s41635-020-00092-z","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133685677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Karim Amin, C. Gebotys, Mustafa Faraj, Haohao Liao
{"title":"Analysis of Dynamic Laser Injection and Quiescent Photon Emissions on an Embedded Processor","authors":"Karim Amin, C. Gebotys, Mustafa Faraj, Haohao Liao","doi":"10.1007/s41635-020-00090-1","DOIUrl":"https://doi.org/10.1007/s41635-020-00090-1","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131986352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}