[Front matter] (PDF)
Building trusted ICs using split fabrication (Abstract)
Split-fabrication obfuscation: Metrics and techniques (Abstract)
Efficient and secure intellectual property (IP) design with split fabrication (Abstract)
Verification of untrusted chips using trusted layout and emission measurements (Abstract)
Cryptographically secure shields (Abstract)
Side-channel leakage on silicon substrate of CMOS cryptographic chip (Abstract)
On design of a highly secure PUF based on non-linear current mirrors (Abstract)
Entropy loss in PUF-based key generation schemes: The repetition code pitfall (Abstract)
Composite PUF: A new design paradigm for Physically Unclonable Functions on FPGA (Abstract)
A look into SIMON from a side-channel perspective (Abstract)
Increasing the efficiency of laser fault injections using fast gate level reverse engineering (Abstract)
IP-level implementation of a resistance-based physical unclonable function (Abstract)
Security of SoC firmware load protocols (Abstract)
A hierarchical formal approach to verifying side-channel resistant cryptographic processors (Abstract)
Optimality and beyond: The case of 4×4 S-boxes (Abstract)
EM-based detection of hardware trojans on FPGAs (Abstract)
Robust keys from physical unclonable functions (Abstract)
Side-channel countermeasure for SHA-3 at almost-zero area overhead (Abstract)
A frequency leakage model for SCA (Abstract)
Bit selection algorithm suitable for high-volume production of SRAM-PUF (Abstract)
Hardware trojan detection by symmetry breaking in path delays (Abstract)
Experimental evaluation of two software countermeasures against fault attacks (Abstract)
NREPO: Normal basis Recomputing with Permuted Operands (Abstract)
A noise bifurcation architecture for linear additive physical functions (Abstract)
Power supply glitch attacks: Design and evaluation of detection circuits (Abstract)
New scan attacks against state-of-the-art countermeasures and DFT (Abstract)
Countering the effects of silicon aging on SRAM PUFs (Abstract)
DWM-PUF: A low-overhead, memory-based security primitive (Abstract)
A Chaotic Ring oscillator based Random Number Generator (Abstract)