Correction to: Post-configuration Activation of Hardware Trojans in FPGAs Qazi Arbab AhmedTobias WiersemaMarco Platzner Correction Open access 19 November 2024
On the Response Entropy of APUFs Vincent DumoulinWenjing RaoNatasha Devroye OriginalPaper 31 July 2024 Pages: 187 - 203
Analyzing Aging Effects on SRAM PUFs: Implications for Security and Reliability Niraj Prasad BhattaHarshdeep SinghFathi Amsaad OriginalPaper Open access 27 July 2024 Pages: 174 - 186
A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication Mahmudul HasanTamzidul HoqueSumaiya Shomaji OriginalPaper 26 July 2024 Pages: 160 - 173
Recycled Counterfeit Chips Detection for AMS and Digital ICs Using Low-Area, Self-Contained, and Secure LDO Odometers Sourav RoyJinHong ChenDomenic Forte OriginalPaper 18 July 2024 Pages: 145 - 159
AutoDetect: Novel Autoencoding Architecture for Counterfeit IC Detection Chaitanya BhureGeraldine Shirley NicholasFareena Saqib OriginalPaper Open access 23 May 2024 Pages: 113 - 132
ViSE: Digital Twin Exploration for Automotive Functional Safety and Cybersecurity Md Rafiul KabirSandip Ray OriginalPaper 17 May 2024 Pages: 133 - 144
Enabling Secure and Efficient Sharing of Accelerators in Expeditionary Systems Arsalan Ali MalikEmre KarabulutAydin Aysu OriginalPaper 08 May 2024 Pages: 94 - 112
Guarding Against the Unknown: Deep Transfer Learning for Hardware Image-Based Malware Detection Zhangying HeHouman HomayounHossein Sayadi OriginalPaper 15 March 2024 Pages: 61 - 78
Post-configuration Activation of Hardware Trojans in FPGAs Qazi Arbab AhmedTobias WiersemaMarco Platzner OriginalPaper Open access 13 March 2024 Pages: 79 - 93
MaGNIFIES: Manageable GAN Image Augmentation Framework for Inspection of Electronic Systems Pallabi GhoshGijung LeeDomenic Forte OriginalPaper 19 February 2024 Pages: 44 - 59
Machine Learning-Based Security Evaluation and Overhead Analysis of Logic Locking Yeganeh AghamohammadiAmin Rezaei OriginalPaper 22 January 2024 Pages: 25 - 43
Enhancing the Reliability of Closed-Loop Medical Systems with Real-Time Biosignal Modeling Shakil MahmudFarhath ZareenRobert Karam OriginalPaper 04 January 2024 Pages: 12 - 24
Hybrid Quantum Artificial Intelligence Electromagnetic Spectrum Analysis Framework for Transportation System Security Varghese Mathew VaidyanBhaskar P. Rimal OriginalPaper 29 December 2023 Pages: 1 - 11
EXERTv2: Exhaustive Integrity Analysis for Information Flow Security with FSM Integration Jiaming WuDomenic Forte OriginalPaper 26 December 2023 Pages: 147 - 164
Correction to: An Analysis of FPGA LUT Bias and Entropy for Physical Unclonable Functions Jenilee JaoIan WilcoxPavel B. Bochev Correction 06 February 2024 Pages: 124 - 124
A Practical Approach to Estimate the Min-Entropy in PUFs Christoph FrischFlorian WildeMichael Pehl OriginalPaper Open access 08 November 2023 Pages: 138 - 146
A Novel Physical Unclonable Function Based on Hybrid Current Mirror Gisha C. G.Ananda Sankar ChakrabortyJimson Mathew OriginalPaper 16 October 2023 Pages: 125 - 137
An Analysis of FPGA LUT Bias and Entropy for Physical Unclonable Functions Jenilee JaoIan WilcoxPavel B. Bochev OriginalPaper 26 September 2023 Pages: 110 - 123
Design and Evaluation of a Power Analysis Resilient Implementation of Piccolo-80 Lightweight Encryption Algorithm M. Masoumi OriginalPaper 21 September 2023 Pages: 101 - 109
Instruction-Level Power Side-Channel Leakage Evaluation of Soft-Core CPUs on Shared FPGAs Ognjen GlamočaninShashwat ShrivastavaMirjana Stojilović OriginalPaper Open access 04 October 2023 Pages: 72 - 99
A Versatile and Flexible Multiplier Generator for Large Integer Polynomials Malik ImranZain Ul AbideenSamuel Pagliarini OriginalPaper 26 June 2023 Pages: 55 - 71
CROWBAR: Natively Fuzzing Trusted Applications Using ARM CoreSight Haoqi ShanMoyao HuangDean Sullivan OriginalPaper Open access 15 June 2023 Pages: 44 - 54
A Comprehensive Taxonomy of Visual Printed Circuit Board Defects David Selasi KoblahOlivia P. Dizon-ParadisDomenic Forte ReviewPaper 24 April 2023 Pages: 25 - 43
FPGA Design Deobfuscation by Iterative LUT Modification at Bitstream Level Michail MoraitisElena Dubrova OriginalPaper Open access 16 February 2023 Pages: 11 - 24
Active Shielding Against Physical Attacks by Observation and Fault Injection: ChaXa Clément GaineJean-Pierre NikolovskiJean-Max Dutertre OriginalPaper 10 February 2023 Pages: 1 - 10
Network-on-Chip Trust Validation Using Security Assertions Aruna JayasenaBinod KumarPrabhat Mishra OriginalPaper 07 December 2022 Pages: 79 - 94
Novel Feature Selection for Non-destructive Detection of Hardware Trojans Using Hyperspectral Scanning Erik J. JorgensenAndrew KacmarcikAlenka Zajić OriginalPaper 28 June 2022 Pages: 32 - 46
A High-Speed, Long-Distance and Wall-Penetrating Covert Channel Based on EM Emanations from DRAM Clock Zihao ZhanZhenkai ZhangXenofon Koutsoukos OriginalPaper 10 August 2022 Pages: 47 - 65
PAKAMAC: A PUF-based Keyless Automotive Entry System with Mutual Authentication Swapnil GadeUrbi ChatterjeeDebdeep Mukhopadhyay OriginalPaper 21 May 2022 Pages: 67 - 78
Securing 3rd-Party HDL IP: a Feasibility Study Using Evolutionary Methods Bayley KingRashmi JhaDavid Kap OriginalPaper 31 March 2022 Pages: 17 - 31
Differential Fault Attack on Feistel-Based Sponge AE Schemes Amit Jana OriginalPaper 21 March 2022 Pages: 1 - 16
A Secure Boot Framework with Multi-security Features and Logic-Locking Applications for Reconfigurable Logic Geraldine Shirley NicholasAli Shuja SiddiquiFareena Saqib OriginalPaper 29 November 2021 Pages: 260 - 268
Design and Analysis of Reconfigurable Cryptographic Primitives: TRNG and PUF Vikash Kumar RaiSomanath TripathyJimson Mathew OriginalPaper 09 November 2021 Pages: 247 - 259
Turning the Table: Using Bitstream Reverse Engineering to Detect FPGA Trojans Wafi DaneshJoshua BanagoMostafizur Rahman OriginalPaper 01 November 2021 Pages: 237 - 246
BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person Sumaiya ShomajiZimu GuoDomenic Forte OriginalPaper 25 October 2021 Pages: 223 - 236
The Use of Anomaly Detection for the Detection of Different Types of DDoS Attacks in Cloud Environment Hossein AbbasiNaser Ezzati-JivanMichel R. Dagenais OriginalPaper 16 October 2021 Pages: 208 - 222
An Attack on Linear Scan Chains for Stream Ciphers and the Impossibility of Simple Countermeasures Bijoy DasAmit SardarDipanwita Roy Chowdhury OriginalPaper 21 August 2021 Pages: 191 - 207
Deep Learning Classification of Motherboard Components by Leveraging EM Side-Channel Signals Erik J. JorgensenFrank T. WernerAlenka Zajić OriginalPaper 05 June 2021 Pages: 114 - 126
Methods and Analysis of Automated Trace Alignment Under Power Obfuscation in Side Channel Attacks Bozhi LiuKemeng ChenRoman Lysecky OriginalPaper 02 July 2021 Pages: 127 - 142
A Survey on Cache Timing Channel Attacks for Multicore Processors Jaspinder KaurShirshendu Das ReviewPaper 19 May 2021 Pages: 169 - 189
Firmware Security Module Claudius PottPhilipp JungklassMarco Siebert OriginalPaper Open access 30 April 2021 Pages: 103 - 113
An Observation of Non-randomness in NFSR-Based Stream Ciphers with Reduced Initialization Round Dibyendu RoyDeepak Kumar Dalai OriginalPaper 24 March 2021 Pages: 89 - 102
Whispering Devices: A Survey on How Side-channels Lead to Compromised Information Corentin LavaudRobin GerzaguetStephane Molton ReviewPaper 20 March 2021 Pages: 143 - 168
On the Limitations of Obfuscating Redundant Circuits in Frustrating Hardware Trojan Implantation Nathanael WeidlerRyan GerdesThidapat Chantem OriginalPaper 16 March 2021 Pages: 75 - 87
Understanding Security Threats in Emerging Neuromorphic Computing Architecture Chidhambaranathan RajamanikkamRajesh JSKoushik Chakraborty OriginalPaper 13 February 2021 Pages: 45 - 57
Reconfigurable TPM Implemented with Ultralow-Power Management in 28nm CMOS Process for IoT SoC Design Zenan HuangXiao ZhangDonghui Guo OriginalPaper 19 January 2021 Pages: 32 - 44
Towards Designing a Secure RISC-V System-on-Chip: ITUS Vinay B. Y. KumarSuman DebAvi Mendelson OriginalPaper 10 November 2020 Pages: 329 - 342
Probabilistic Hardware Trojan Attacks on Multiple Layers of Reconfigurable Network Infrastructure Rijoy MukherjeeVidya GovindanRajat Subhra Chakraborty OriginalPaper 02 November 2020 Pages: 343 - 360
Systematic Side-Channel Analysis of Curve25519 with Machine Learning Léo WeissbartŁukasz ChmielewskiLejla Batina OriginalPaper Open access 16 October 2020 Pages: 314 - 328