{"title":"Special Issue: 2019 PAINE Conference—Physical Assurance and Inspection of Electronics","authors":"N. Asadi, M. Tehranipoor","doi":"10.1007/s41635-020-00091-0","DOIUrl":"https://doi.org/10.1007/s41635-020-00091-0","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114697065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Neural Network–Based Detection and Verification of Microelectronic Images","authors":"Md. Alimoor Reza, Zhenhua Chen, David J. Crandall","doi":"10.1007/s41635-019-00088-4","DOIUrl":"https://doi.org/10.1007/s41635-019-00088-4","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"8 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122016837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adam G. Kimura, Jonathan Scholl, James Schaffranek, Matt Sutter, Andrew Elliott, Michael Strizich, G. Via
{"title":"A Decomposition Workflow for Integrated Circuit Verification and Validation","authors":"Adam G. Kimura, Jonathan Scholl, James Schaffranek, Matt Sutter, Andrew Elliott, Michael Strizich, G. Via","doi":"10.1007/s41635-019-00086-6","DOIUrl":"https://doi.org/10.1007/s41635-019-00086-6","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123926278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Throughput/Area Efficient Implementation of Scalable Polynomial Basis Multiplication","authors":"Bahram Rashidi","doi":"10.1007/s41635-019-00087-5","DOIUrl":"https://doi.org/10.1007/s41635-019-00087-5","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126462969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jonathan Graf, Whitney Batchelor, S. Harper, Ryan Marlow, E. Carlisle, P. Athanas
{"title":"A practical application of game theory to optimize selection of hardware Trojan detection strategies","authors":"Jonathan Graf, Whitney Batchelor, S. Harper, Ryan Marlow, E. Carlisle, P. Athanas","doi":"10.1007/s41635-019-00089-3","DOIUrl":"https://doi.org/10.1007/s41635-019-00089-3","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132088849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Ashokkumar, B. Roy, Bhargav Sri Venkatesh, L. Bernard, Menezes
{"title":"“S-Box” Implementation of AES Is Not Side Channel Resistant","authors":"C. Ashokkumar, B. Roy, Bhargav Sri Venkatesh, L. Bernard, Menezes","doi":"10.1007/s41635-019-00082-w","DOIUrl":"https://doi.org/10.1007/s41635-019-00082-w","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127177081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Sakib Hasan, M. Majumder, A. S. Shanta, Mesbah Uddin, G. Rose
{"title":"A Chaos-Based Complex Micro-instruction Set for Mitigating Instruction Reverse Engineering","authors":"Md. Sakib Hasan, M. Majumder, A. S. Shanta, Mesbah Uddin, G. Rose","doi":"10.1007/s41635-019-00085-7","DOIUrl":"https://doi.org/10.1007/s41635-019-00085-7","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114361415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Karageorgos, Mehmet Meric Isgenc, S. Pagliarini, L. Pileggi
{"title":"Chip-to-Chip Authentication Method Based on SRAM PUF and Public Key Cryptography","authors":"I. Karageorgos, Mehmet Meric Isgenc, S. Pagliarini, L. Pileggi","doi":"10.1007/s41635-019-00080-y","DOIUrl":"https://doi.org/10.1007/s41635-019-00080-y","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116967750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abderrahmane Sensaoui, O. Aktouf, D. Hély, Stéphane Di Vito
{"title":"An In-depth Study of MPU-Based Isolation Techniques","authors":"Abderrahmane Sensaoui, O. Aktouf, D. Hély, Stéphane Di Vito","doi":"10.1007/s41635-019-00078-6","DOIUrl":"https://doi.org/10.1007/s41635-019-00078-6","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130093445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Secure Caches Using a Three-Step Model for Timing-Based Attacks","authors":"Shuwen Deng, Wenjie Xiong, Jakub Szefer","doi":"10.1007/s41635-019-00075-9","DOIUrl":"https://doi.org/10.1007/s41635-019-00075-9","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125350345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}