Hardware Trojans: current challenges and approaches
IET Computers & Digital Techniques
2014
Volume 8, Issue 6
Nov
264-273
Investigating Measurement Methods for High-Resolution Electromagnetic Field Side-Channel Analysis
International Symposium on Integrated Circuits (ISIC)
Singapore
2014
Closing the Gap Between Speed and Configurability of Multi-Bit Fault Emulation Environments for Security and Safety-Critical Designs
EUROMICRO Conference on Digital System Design (DSD)
Verona, Italien
2014
On Cache Timing Attacks Considering Multi-Core Aspects in Virtualized Embedded Systems
The 6th International Conference on Trustworthy Systems (InTrust 2014)
Beijing, China
2014
Defeating Microprobing Attacks using a Resource Efficient Detection Circuit
Conference on Design of Circuits and Integrated Systems
Madrid, Spain
2014
Herausforderungen der ganzheitlichen Absicherung eingebetteter Systeme
Datenschutz und Datensicherheit - DuD
2014
Nov
Volume 38, Issue 11 , pp 757-761
On Efficient Leakage Resilient Pseudo-Random Functions from Hard-to-Invert Leakages
Third International Conference on Cryptology and Information Security in Latin America (LATINCRYPT 2014)
Florianópolis, Brazil
2014
Ciphertext-Only Fault Attacks on PRESENT
Third International Workshop on Lightweight Cryptography for Security & Privacy (LIGHTSEC 2014)
Istanbul, Turkey
2014
Advanced Performance Metrics for Physical Unclonable Functions
International Symposium on Integrated Circuits (ISIC)
Singapore
2014
Statistic-based Security Analysis of Ring Oscillator PUFs
International Symposium on Integrated Circuits (ISIC)
Singapore
2014