The Community for Technology Leaders
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST) (2016)
Yilan, Taiwan
Dec. 19, 2016 to Dec. 20, 2016
ISBN: 978-1-5090-5702-3
TABLE OF CONTENTS

Front matter (PDF)

pp. 1-13

A new approach for root-causing attacks on digital microfluidic devices (Abstract)

Pushpita Roy , Indian Statistical Institute, Kolkata, India
Ansuman Banerjee , Indian Statistical Institute, Kolkata, India
pp. 1-6

A new event-driven Dynamic Vision Sensor based Physical Unclonable Function for camera authentication in reactive monitoring system (Abstract)

Yue Zheng , School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore
Yuan Cao , College of Internet of Things Engineering, Hohai University, Changzhou, China
Chip-Hong Chang , School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore
pp. 1-6

Aging attacks for key extraction on permutation-based obfuscation (Abstract)

Zimu Guo , ECE Department, University of Florida, United States
Mark M. Tehranipoor , ECE Department, University of Florida, United States
Domenic Forte , ECE Department, University of Florida, United States
pp. 1-6

An enhanced classification-based golden chips-free hardware Trojan detection technique (Abstract)

Mingfu Xue , College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, 210016, China
Jian Wang , College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, 210016, China
Aiqun Hux , School of Information Science and Engineering, Southeast University, Nanjing, 210096, China
pp. 1-6

An ultra-low overhead LUT-based PUF for FPGA (Abstract)

Jiadong Wang , School of Electronic and Information Engineering, Harbin Institute of Technology Shenzhen Graduate School, China
Aijiao Cui , School of Electronic and Information Engineering, Harbin Institute of Technology Shenzhen Graduate School, China
Mengyang Li , School of Electronic and Information Engineering, Harbin Institute of Technology Shenzhen Graduate School, China
Gang Qu , Department of Electrical and Computer Engineering and Institute for Systems Research, University of Maryland, College Park, USA
Huawei Li , SKLCA, Institute of Computing Technology, Chinese Academy of Sciences, China
pp. 1-6

Chosen ciphertext Simple Power Analysis on software 8-bit implementation of ring-LWE encryption (Abstract)

Aesun Park , Department of Financial Information Security, Kookmin University, Seoul, Korea
Dong-Guk Han , Department of Financial Information Security, Kookmin University, Seoul, Korea
pp. 1-6

Comparing Sboxes of ciphers from the perspective of side-channel attacks (Abstract)

Liran Lerman , Quality and Security of Information Systems, Université libre de Bruxelles, Belgium
Olivier Markowitch , Quality and Security of Information Systems, Université libre de Bruxelles, Belgium
Nikita Veshchikov , Quality and Security of Information Systems, Université libre de Bruxelles, Belgium
pp. 1-6

Defeating drone jamming with hardware sandboxing (Abstract)

Joshua Mead , Computer Science and Computer Engineering, University of Arkansas, Fayetteville, 72701, United States
Christophe Bobda , Computer Science and Computer Engineering, University of Arkansas, Fayetteville, 72701, United States
Taylor JL Whitaker , Computer Science and Computer Engineering, University of Arkansas, Fayetteville, 72701, United States
pp. 1-6

Echeloned IJTAG data protection (Abstract)

Senwen Kan , Advanced Micro Devices, United States
Jennifer Dworak , Southern Methodist University, United States
James George Dunham , Southern Methodist University, United States
pp. 1-6

Enhancing noise sensitivity of embedded SRAMs for robust true random number generation in SoCs (Abstract)

M. Tauhidur Rahman , Dept. of Electrical and Computer Engineering, University of Florida Gainesville, United States
Domenic Forte , Dept. of Electrical and Computer Engineering, University of Florida Gainesville, United States
Xiaoxiao Wang , Dept. of Electrical and Computer Engineering, Beihang University, China
Mark Tehranipoor , Dept. of Electrical and Computer Engineering, University of Florida Gainesville, United States
pp. 1-6

Error detection reliable architectures of Camellia block cipher applicable to different variants of its substitution boxes (Abstract)

Mehran Mozaffari Kermani , Department of Electrical and Microelectronic Engineering, Rochester Institute of Technology, NY, United States
Reza Azarderakhsh , Department of Computer and Electrical Engineering, and Computer Science, Florida Atlantic University, Boca Raton, United States
Jiafeng Xie , Department of Electrical Engineering, Wright State University, Fairborn, OH, United States
pp. 1-6

How secure is split manufacturing in preventing hardware trojan? (Abstract)

Zhang Chen , School of Information Science and Technology, ShanghaiTech University, China
Pingqiang Zhou , School of Information Science and Technology, ShanghaiTech University, China
Tsung-Yi Ho , Department of Computer Science, National Tsing Hua University, Hsinchu, Taiwan 30013
Yier Jin , Department of Electrical & Computer Engineering, University of Central Florida, Orlando, 32816, United States
pp. 1-6

Inner collisions in ECC: Vulnerabilities of complete addition formulas for NIST curves (Abstract)

Poulami Das , Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Indian
Debapriya Basu Roy , Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Indian
Harishma Boyapally , Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Indian
Debdeep Mukhopadhyay , Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Indian
pp. 1-6

Key extraction from the primary side of a switched-mode power supply (Abstract)

Sami Saab , Rambus Cryptography Research Division, 425 Market St Fl 11, San Francisco CA 94105-2496, USA
Andrew Leiserson , Rambus Cryptography Research Division, 425 Market St Fl 11, San Francisco CA 94105-2496, USA
Michael Tunstall , Rambus Cryptography Research Division, 425 Market St Fl 11, San Francisco CA 94105-2496, USA
pp. 1-7

Laser irradiation on EEPROM sense amplifiers enhances side-channel leakage of read bits (Abstract)

Junichi Sakamoto , Graduate School of Environment and Information Science, Yokohama National University, 79-7 Tokiwadai Hodogaya-ku, Japan
Daisuke Fujimoto , Graduate School of Environment and Information Science, Yokohama National University, 79-7 Tokiwadai Hodogaya-ku, Japan
Tsutomu Matsumoto , Graduate School of Environment and Information Science, Yokohama National University, 79-7 Tokiwadai Hodogaya-ku, Japan
pp. 1-6

On-chip substrate-bounce monitoring for laser-fault countermeasure (Abstract)

Kohei Matsuda , Kobe University, Japan
Noriyuki Miura , Kobe University, Japan
Makoto Nagata , Kobe University, Japan
Yu-ichi Hayashi , Tohoku-Gakuin University, Japan
Tatsuya Fujii , The University of Electro-Communications, Japan
Kazuo Sakiyama , The University of Electro-Communications, Japan
pp. 1-6

RECORD: Temporarily Randomized Encoding of COmbinational Logic for Resistance to Data Leakage from hardware Trojan (Abstract)

Travis E. Schulze , Dept. of ECE, Missouri University of Science and Technology, Rolla, USA, 65401
Kevin Kwiat , Air Force Research Lab., Information Directorate, Cyber Assurance Branch, Rome, NY, USA, 13441
Charles Kamhoua , Air Force Research Lab., Information Directorate, Cyber Assurance Branch, Rome, NY, USA, 13441
Shih-Chieh Chang , Dept. of Computer Science, National Tsing Hua University, Hsin-Chu, Taiwan, ROC
Yiyu Shi , Dept. of CSE, University of Notre Dame, IN, USA, 46556
pp. 1-6

RPUF: Physical Unclonable Function with Randomized Challenge to resist modeling attack (Abstract)

Jing Ye , State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, China
Yu Hu , State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, China
Xiaowei Li , State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, China
pp. 1-6

Sneak path enabled authentication for memristive crossbar memories (Abstract)

Md. Badruddoja Majumder , Department of Electrical Engineering and Computer Science, University of Tennessee, Knoxville, 37996 USA
Mesbah Uddin , Department of Electrical Engineering and Computer Science, University of Tennessee, Knoxville, 37996 USA
Garrett S. Rose , Department of Electrical Engineering and Computer Science, University of Tennessee, Knoxville, 37996 USA
Jeyavijayan Rajendran , Department of Electrical Engineering, The University of Texas at Dallas, Richardson, 75080 USA
pp. 1-6

Test generation for combinational hardware Trojans (Abstract)

Sying-Jyan Wang , Department of Computer Science and Engineering, National Chung-Hsing University, Taichung, Taiwan
Jhih-Yu Wei , Department of Computer Science and Engineering, National Chung-Hsing University, Taichung, Taiwan
Shih-Heng Huang , Department of Computer Science and Engineering, National Chung-Hsing University, Taichung, Taiwan
Katherine Shu-Min Li , Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan
pp. 1-6

Transistor-level camouflaged logic locking method for monolithic 3D IC security (Abstract)

Jaya Dofe , Department of Electrical and Computer Engineering, University of New Hampshire, Durham, 03824, USA
Chen Yan , Department of Electrical and Computer Engineering, Stony Brook University, NY 11794, USA
Scott Kontak , Department of Electrical and Computer Engineering, Stony Brook University, NY 11794, USA
Emre Salman , Department of Electrical and Computer Engineering, Stony Brook University, NY 11794, USA
Qiaoyan Yu , Department of Electrical and Computer Engineering, University of New Hampshire, Durham, 03824, USA
pp. 1-6

Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors (Abstract)

Syed Rafay Hasan , ECE Department, Tennessee Tech University, Cookeville, United States of America
Charles A. Kamhoua , Air Force Research Laboratory, Information Directorate, Cyber Assurance Branch, Rome, NY, United States of America
Kevin A. Kwiat , Air Force Research Laboratory, Information Directorate, Cyber Assurance Branch, Rome, NY, United States of America
Laurent Njilla , Air Force Research Laboratory, Information Directorate, Cyber Assurance Branch, Rome, NY, United States of America
pp. 1-6

Upper bounds on the min-entropy of RO Sum, Arbiter, Feed-Forward Arbiter, and S-ArbRO PUFs (Abstract)

Jeroen Delvaux , KU Leuven, ESAT/COSIC and iMinds, Belgium
Dawu Gu , Shanghai Jiao Tong University, CSE/LoCCS, China
Ingrid Verbauwhede , KU Leuven, ESAT/COSIC and iMinds, Belgium
pp. 1-6

Using image sensor PUF as root of trust for birthmarking of perceptual image hash (Abstract)

Yuan Cao , College of Internet of Things Engineering, Hohai University, Changzhou, China
Le Zhang , School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore
Chip-Hong Chang , School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore
pp. 1-6
79 ms
(Ver 3.3 (11022016))