The Community for Technology Leaders
2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (2016)
McLean, VA, USA
May 3, 2016 to May 5, 2016
ISBN: 978-1-4673-8825-2
TABLE OF CONTENTS

[Front matter] (PDF)

pp. i-xxx

Robust privacy-preserving fingerprint authentication (Abstract)

Ye Zhang , Dept. of ECE, Rice University, Houston, Texas, USA
Farinaz Koushanfar , Dept. of ECE, Rice University, Houston, Texas, USA
pp. 1-6

UCR: An unclonable chipless RFID tag (Abstract)

Kun Yang , ECE Department, University of Florida
Domenic Forte , ECE Department, University of Florida
Mark M. Tehranipoor , ECE Department, University of Florida
pp. 7-12

A highly reliable and tamper-resistant RRAM PUF: Design and experimental validation (Abstract)

Rui Liu , School of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, AZ 85287, USA
Huaqiang Wu , Institute of Microelectronics, Tsinghua University, Beijing 100084, China
Yachun Pang , Institute of Microelectronics, Tsinghua University, Beijing 100084, China
He Qian , Institute of Microelectronics, Tsinghua University, Beijing 100084, China
Shimeng Yu , School of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, AZ 85287, USA
pp. 13-18

Machine learning resistant strong PUF: Possible or a pipe dream? (Abstract)

Arunkumar Vijayakumar , Department of Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, USA
Vinay C. Patil , Department of Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, USA
Charles B. Prado , National Institute of Metrology, Quality and Technology (Inmetro), Brazil
Sandip Kundu , Department of Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, USA
pp. 19-24

LEDPUF: Stability-guaranteed physical unclonable functions through locally enhanced defectivity (Abstract)

Wei-Che Wang , Department of Electrical Engineering, University of California, Los Angeles
Yair Yona , Department of Electrical Engineering, University of California, Los Angeles
Suhas Diggavi , Department of Electrical Engineering, University of California, Los Angeles
Puneet Gupta , Department of Electrical Engineering, University of California, Los Angeles
pp. 25-30

Parsimonious design strategy for linear layers with high diffusion in block ciphers (Abstract)

Sikhar Patranabis , Department of Computer Science and Engineering, IIT Kharagpur, India
Debapriya Basu Roy , Department of Computer Science and Engineering, IIT Kharagpur, India
Yash Shrivastava , Department of Computer Science and Engineering, IIT Kharagpur, India
Debdeep Mukhopadhyay , Department of Computer Science and Engineering, IIT Kharagpur, India
Santosh Ghosh , Intel Labs, Hillsboro, Oregon, USA
pp. 31-36

Iterating Von Neumann's post-processing under hardware constraints (Abstract)

Vladimir Rozic , ESAT/COSIC and iMinds, KU Leuven, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium
Bohan Yang , ESAT/COSIC and iMinds, KU Leuven, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium
Wim Dehaene , ESAT/MICAS, KU Leuven and IMEC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium
Ingrid Verbauwhede , ESAT/COSIC and iMinds, KU Leuven, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium
pp. 37-42

Controlling your control flow graph (Abstract)

Arun Kanuparthi , Security Center of Excellence, Intel Corporation
Jeyavijayan Rajendran , Department of Electrical Engineering, The University of Texas at Dallas
Ramesh Karri , Department of Electrical Engineering, New York University
pp. 43-48

An area-optimized serial implementation of ICEPOLE authenticated encryption schemes (Abstract)

Michael Tempelmeier , Technische Universität München, Munich, Germany
Fabrizio De Santis , Technische Universität München, Munich, Germany
Jens-Peter Kaps , George Mason University, Fairfax, VA, USA
Georg Sig , Technische Universität München, Munich, Germany
pp. 49-54

Round gating for low energy block ciphers (Abstract)

Subhadeep Banik , DTU Compute, Technical University of Denmark, 2800 Kgs. Lyngby
Andrey Bogdanov , DTU Compute, Technical University of Denmark, 2800 Kgs. Lyngby
Francesco Regazzoni , ALaRI-USI via Buffi, 13 6900, Lugano, Switzerland
Takanori Isobe , Sony Corporation, Tokyo, Japan
Harunaga Hiwatari , Sony Corporation, Tokyo, Japan
Toru Akishita , Sony Corporation, Tokyo, Japan
pp. 55-60

Functional polymorphism for intellectual property protection (Abstract)

Jeffrey T. McDonald , School of Computing, University of South Alabama
Yong C. Kim , Air Force Research Laboratory, Wright Patterson AFB
Todd R. Andel , School of Computing, University of South Alabama
Miles A. Forbes , School of Computing, University of South Alabama
James McVicar , School of Computing University of South Alabama
pp. 61-66

The Conjoined Microprocessor (Abstract)

Ehsan Aerabi , Iran University of Science and Technology, Computer Engineering Dept., Tehran, Iran - 13114-16846
A. Elhadi Amirouche , Sorbonne Universités, Université Paris ii, 12 Place du Pantheon, f-75231, Paris, France
Houda Ferradi , École normale supéerieure, Departement d'informatique 45, rue d'Ulm, f-75230, Paris Cedex 05, France
Remi Geraud , École normale supéerieure, Departement d'informatique 45, rue d'Ulm, f-75230, Paris Cedex 05, France
David Naccache , École normale supéerieure, Departement d'informatique 45, rue d'Ulm, f-75230, Paris Cedex 05, France
Jean Vuillemin , École normale supéerieure, Departement d'informatique 45, rue d'Ulm, f-75230, Paris Cedex 05, France
pp. 67-70

Low-area hardware implementations of CLOC, SILC and AES-OTR (Abstract)

Subhadeep Banik , DTU Compute, Technical University of Denmark, 2800 Kgs. Lyngby
Andrey Bogdanov , DTU Compute, Technical University of Denmark, 2800 Kgs. Lyngby
Kazuhiko Minematsu , NEC Corporation, Kawasaki, Japan
pp. 71-74

Functional block identification in circuit design recovery (Abstract)

Jacob Couch , Johns Hopkins University, Applied Physics Laboratory, Laurel, MD
Elizabeth Reilly , Johns Hopkins University, Applied Physics Laboratory, Laurel, MD
Morgan Schuyler , Johns Hopkins University, Applied Physics Laboratory, Laurel, MD
Bradley Barrett , Johns Hopkins University, Applied Physics Laboratory, Laurel, MD
pp. 75-78

Robust hardware true random number generators using DRAM remanence effects (Abstract)

Fatemeh Tehranipoor , Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT USA
Wei Yan , Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT USA
John A. Chandy , Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT USA
pp. 79-84

Blinded random corruption attacks (Abstract)

Rodrigo Branco , Intel Corporation, Security Center of Excellence, USA
Shay Gueron , Intel Corporation, Israel Development Center, Israel
pp. 85-90

ACBuilder: A tool for hardware architecture security evaluation (Abstract)

Henrique Kawakami , Institute of Computing, University of Campinas, Brazil
David Ott , Intel
Hao-Chi Wong , Intel
Ricardo Dahab , Institute of Computing, University of Campinas, Brazil
Roberto Gallo , Institute of Computing, University of Campinas, Brazil
pp. 97-102

On the problems of realizing reliable and efficient ring oscillator PUFs on FPGAs (Abstract)

Alexander Wild , Horst Görtz Institute for IT-Security, Ruhr-Universität Bochum, Germany
Georg T. Becker , Horst Gortz Institute for IT-Security, Ruhr-Universität Bochum, Germany
Tim Guneysu , University of Bremen, Germany
pp. 103-108

Model checking to find vulnerabilities in an instruction set architecture (Abstract)

Chris Bradfield , Weebly, Inc.
Cynthia Sturton , University of North Carolina at Chapel Hill
pp. 109-113

SDSM: Fast and scalable security support for directory-based distributed shared memory (Abstract)

Ofir Shwartz , Electrical Engineering Department, Technion - Israel Institute of Technology, Haifa, Israel
Yitzhak Birk , Electrical Engineering Department, Technion - Israel Institute of Technology, Haifa, Israel
pp. 114-119

Adaptive real-time Trojan detection framework through machine learning (Abstract)

Amey Kulkarni , Department of Computer Science & Electrical Engineering, University of Maryland, Baltimore County
Youngok Pino , Department of Computer Science & Electrical Engineering, University of Maryland, Baltimore County
Tinoosh Mohsenin , Department of Computer Science & Electrical Engineering, University of Maryland, Baltimore County
pp. 120-123

Scalable SoC trust verification using integrated theorem proving and model checking (Abstract)

Xiaolong Guo , Department of Electrical and Computer Engineering, University of Central Florida
Raj Gautam Dutta , Department of Electrical and Computer Engineering, University of Central Florida
Prabhat Mishra , Department of Computer and Information Science and Engineering, University of Florida
Yier Jin , Department of Electrical and Computer Engineering, University of Central Florida
pp. 124-129

Information leakage behind the curtain: Abusing anti-EMI features for covert communication (Abstract)

Johannes Bauer , Robert Bosch Smart Home GmbH, Stuttgart-Vaihingen
Sebastian Schinzel , Münster University of Applied Sciences
Felix Freiling , Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)
Andreas Dewald , ERNW Research GmbH, Heidelberg
pp. 130-134

Granularity and detection capability of an adaptive embedded Hardware Trojan detection system (Abstract)

Maxime Lecomte , CEA-Tech, Gardanne, France
Jacques J.A. Fournier , CEA-Tech, Gardanne, France
Philippe Maurine , LIRMM, Montpellier, France
pp. 135-138

Electronic forensic techniques for manufacturer attribution (Abstract)

Ryan L. Helinski , Sandia National Laboratories, Albuquerque, New Mexico 87123
Edward I. Cole , Sandia National Laboratories, Albuquerque, New Mexico 87123
Gideon Robertson , Sandia National Laboratories, Albuquerque, New Mexico 87123
Jonathan Woodbridge , Sandia National Laboratories, Albuquerque, New Mexico 87123
Lyndon G. Pierson , Sandia National Laboratories, Albuquerque, New Mexico 87123
pp. 139-144

Integrated all-digital low-dropout regulator as a countermeasure to power attack in encryption engines (Abstract)

A. Singh , Georgia Institute of Technology
M. Kar , Georgia Institute of Technology
A. Rajan , Intel Labs
V. De , Intel Labs
S. Mukhopadhyay , Georgia Institute of Technology
pp. 145-148

A layout-driven framework to assess vulnerability of ICs to microprobing attacks (Abstract)

Qihang Shi , ECE Department, University of Connecticut
Navid Asadizanjani , ECE Department, University of Florida
Domenic Forte , ECE Department, University of Florida
Mark M. Tehranipoor , ECE Department, University of Florida
pp. 155-160

A new approach for rowhammer attacks (Abstract)

Rui Qiao , Stony Brook University
Mark Seaborn , Google
pp. 161-166

Hardware-based workload forensics: Process reconstruction via TLB monitoring (Abstract)

Liwei Zhou , Electrical Engineering Department, The University of Texas at Dallas, Richardson, TX 75080, USA
Yiorgos Makris , Electrical Engineering Department, The University of Texas at Dallas, Richardson, TX 75080, USA
pp. 167-172

A key-centric processor architecture for secure computing (Abstract)

David Whelihan , MIT Lincoln Laboratory Lexington, MA, USA
Kate Thurmer , MIT Lincoln Laboratory Lexington, MA, USA
Michael Vai , MIT Lincoln Laboratory Lexington, MA, USA
pp. 173-178

Hardware security risk assessment: A case study (Abstract)

Brent Sherman , Intel Corporation, Security Center of Excellence Group, Hillsboro, OR
David Wheeler , Intel Corporation, Security Center of Excellence Group, Hillsboro, OR
pp. 179-184

A novel security technique to generate truly random and highly reliable reconfigurable ROPUF-based cryptographic keys (Abstract)

Fathi Amsaad , Electrical Engineering and Computer Science, University of Toledo, Toledo, OH
Atul Prasad , Electrical Engineering and Computer Science, University of Toledo, Toledo, OH
Chayanika Roychaudhuri , Electrical Engineering and Computer Science, University of Toledo, Toledo, OH
Mohammed Niamat , Electrical Engineering and Computer Science, University of Toledo, Toledo, OH
pp. 185-190

A zero-cost approach to detect recycled SoC chips using embedded SRAM (Abstract)

Zimu Guo , ECE Department, University of Florida
Md. Tauhidur Rahman , ECE Department, University of Florida
Mark M. Tehranipoor , ECE Department, University of Florida
Domenic Forte , ECE Department, University of Florida
pp. 191-196

Redirecting DRAM memory pages: Examining the threat of system memory Hardware Trojans (Abstract)

Bradley Hopkins , Defence Science and Technology Group, Australia
John Shield , Defence Science and Technology Group, Australia
Chris North , Defence Science and Technology Group, Australia
pp. 197-202

Large laser spots and fault sensitivity analysis (Abstract)

Falk Schellenberg , Horst Görtz Institute for IT-Security, Ruhr-Universität Bochum, Germany
Markus Finkeldey , Photonics and Terahertz-Technology, Ruhr-Universität Bochum, Germany
Nils Gerhardt , Photonics and Terahertz-Technology, Ruhr-Universität Bochum, Germany
Martin Hofmann , Photonics and Terahertz-Technology, Ruhr-Universität Bochum, Germany
Amir Moradi , Horst Görtz Institute for IT-Security, Ruhr-Universität Bochum, Germany
Christof Paar , Horst Görtz Institute for IT-Security, Ruhr-Universität Bochum, Germany
pp. 203-208

The other side of the coin: Analyzing software encoding schemes against fault injection attacks (Abstract)

Jakub Breier , Physical Analysis and Cryptographic Engineering, Nanyang Technological University, Singapore
Dirmanto Jap , Physical Analysis and Cryptographic Engineering, Nanyang Technological University, Singapore
Shivam Bhasin , Physical Analysis and Cryptographic Engineering, Nanyang Technological University, Singapore
pp. 209-216

IP core protection using voltage-controlled side-channel receivers (Abstract)

Peter Samarin , Bonn-Rhein-Sieg University of Applied Sciences, Sankt Augustin, Germany
Kerstin Lemke-Rust , Bonn-Rhein-Sieg University of Applied Sciences, Sankt Augustin, Germany
Christof Paar , Ruhr University Bochum, Bochum, Germany
pp. 217-222

A separation and protection scheme for on-chip memory blocks in FPGAs (Abstract)

Luis Ramirez Rivera , Dept. of Electrical and Computer Engineering, Villanova University, Villanova, PA 19085, USA
Xiaofang Wang , Dept. of Electrical and Computer Engineering, Villanova University, Villanova, PA 19085, USA
Danai Chasaki , Dept. of Electrical and Computer Engineering, Villanova University, Villanova, PA 19085, USA
pp. 223-228

A secure camouflaged threshold voltage defined logic family (Abstract)

Burak Erbagci , Electrical and Computer Engineering Department, Carnegie Mellon University, Pittsburgh PA 15213, USA
Cagri Erbagci , Electrical and Computer Engineering Department, Carnegie Mellon University, Pittsburgh PA 15213, USA
Nail Etkin Can Akkaya , Electrical and Computer Engineering Department, Carnegie Mellon University, Pittsburgh PA 15213, USA
Ken Mai , Electrical and Computer Engineering Department, Carnegie Mellon University, Pittsburgh PA 15213, USA
pp. 229-235

SARLock: SAT attack resistant logic locking (Abstract)

Muhammad Yasin , Electrical and Computer Engineering, NYU Tandon School of Engineering, NY, USA
Bodhisatwa Mazumdar , Electrical and Computer Engineering, New York University Abu Dhabi, Abu Dhabi, U.A.E.
Jeyavijayan J V Rajendran , Erik Jonsson School of Engineering & Computer Science, The University of Texas at Dallas, TX, USA
Ozgur Sinanoglu , Electrical and Computer Engineering, New York University Abu Dhabi, Abu Dhabi, U.A.E.
pp. 236-241

Template attacks using classification algorithms (Abstract)

Elif Ozgen , Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB Eindhoven, The Netherlands
Louiza Papachristodoulou , Radboud University Nijmegen, Digital Security Group - ICIS P.O. Box 9010, 6500 GL Nijmegen, The Netherlands
Lejla Batina , Radboud University Nijmegen, Digital Security Group - ICIS P.O. Box 9010, 6500 GL Nijmegen, The Netherlands
pp. 242-247

GenMatch: Secure DNA compatibility testing (Abstract)

M. Sadegh Riazi , Rice University, Houston, TX, USA
Neeraj K. R. Dantu , Rice University, Houston, TX, USA
L. N. Vinay Gattu , Rice University, Houston, TX, USA
Farinaz Koushanfar , University of California, San Diego, USA
pp. 248-253
80 ms
(Ver 3.3 (11022016))