The Community for Technology Leaders
2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (2018)
Washington, DC, USA
April 30, 2018 to May 4, 2018
ISBN: 978-1-5386-4732-5
TABLE OF CONTENTS

[Front matter] (PDF)

pp. i-xxx

Syndrome: Spectral analysis for anomaly detection on medical IoT and embedded devices (Abstract)

Nader Sehatbakhsh , Georgia Institute of Technology, Atlanta, GA, USA
Monjur Alam , Georgia Institute of Technology, Atlanta, GA, USA
Alireza Nazari , Georgia Institute of Technology, Atlanta, GA, USA
Alenka Zajic , Georgia Institute of Technology, Atlanta, GA, USA
Milos Prvulovic , Georgia Institute of Technology, Atlanta, GA, USA
pp. 1-8

TZSlicer: Security-aware dynamic program slicing for hardware isolation (Abstract)

Mengmei Ye , Department of Computer Science and Engineering, University of Nebraska-Lincoln, Lincoln, NE, USA
Jonathan Sherman , Department of Computer Science and Engineering, University of Nebraska-Lincoln, Lincoln, NE, USA
Witawas Srisa-an , Department of Computer Science and Engineering, University of Nebraska-Lincoln, Lincoln, NE, USA
Sheng Wei , Department of Computer Science and Engineering, University of Nebraska-Lincoln, Lincoln, NE, USA
pp. 17-24

Zero-permission acoustic cross-device tracking (Abstract)

Nikolay Matyunin , Technical University of Darmstadt, CYSEC, Darmstadt, Germany
Jakub Szefer , Yale University, New Haven, CT, USA
Stefan Katzenbeisser , Technical University of Darmstadt, CYSEC, Darmstadt, Germany
pp. 25-32

Dividing the threshold: Multi-probe localized EM analysis on threshold implementations (Abstract)

Robert Specht , Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching near Munich, Germany
Vincent Immler , Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching near Munich, Germany
Florian Unterstein , Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching near Munich, Germany
Johann Heyszl , Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching near Munich, Germany
Georg Sig , Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching near Munich, Germany
pp. 33-40

Direct read of idle block RAM from FPGAs utilizing photon emission microscopy (Abstract)

Jacob Couch , Johns Hopkins University, Applied Physics Laboratory, Laurel, MD 20723
Nicole Whewell , Johns Hopkins University, Applied Physics Laboratory, Laurel, MD 20723
Andrew Monica , Johns Hopkins University, Applied Physics Laboratory, Laurel, MD 20723
Stergios Papadakis , Johns Hopkins University, Applied Physics Laboratory, Laurel, MD 20723
pp. 41-48

B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection (Abstract)

Vincent Immler , Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching near Munich, Germany
Johannes Obermaier , Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching near Munich, Germany
Martin Konig , Fraunhofer Research Institution for Microsystems and Solid State Technologies (EMFT), Munich, Germany
Matthias Hiller , Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching near Munich, Germany
Georg Sig , Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching near Munich, Germany
pp. 49-56

Fault-assisted side-channel analysis of masked implementations (Abstract)

Yuan Yao , Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, USA
Mo Yang , Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, USA
Conor Patrick , Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, USA
Bilgiday Yuce , Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, USA
Patrick Schaumont , Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, USA
pp. 57-64

An efficient SAT-based algorithm for finding short cycles in cryptographic algorithms (Abstract)

Elena Dubrova , Royal Institute of Technology, Stockholm, Sweden
Maxim Teslenko , Ericsson Research, Ericsson AB, Stockholm, Sweden
pp. 65-72

The CAESAR-API in the real world — Towards a fair evaluation of hardware CAESAR candidates (Abstract)

Michael Tempelmeier , Chair of Security in Information Technology, Technical University of Munich, Munich, Germany
Fabrizio De Santis , Chair of Security in Information Technology, Technical University of Munich, Munich, Germany
Georg Sigl , Chair of Security in Information Technology, Technical University of Munich, Munich, Germany
Jens-Peter Kaps , Cryptographic Engineering Research Group (CERG), Georg Mason University, Fairfax, USA
pp. 73-80

Horizontal side-channel vulnerabilities of post-quantum key exchange protocols (Abstract)

Aydin Aysu , Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA
Youssef Tobah , Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA
Mohit Tiwari , Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA
Andreas Gerstlauer , Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA
Michael Orshansky , Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA
pp. 81-88

Independent detection of recycled flash memory: Challenges and solutions (Abstract)

Preeti Kumari , Dept. of Electrical and Computer Engineering, University of Alabama in Huntsville, Huntsville, AL, USA
B. M. S. Bahar Talukder , Dept. of Electrical and Computer Engineering, University of Alabama in Huntsville, Huntsville, AL, USA
Sadman Sakib , Dept. of Electrical and Computer Engineering, University of Alabama in Huntsville, Huntsville, AL, USA
Biswajit Ray , Dept. of Electrical and Computer Engineering, University of Alabama in Huntsville, Huntsville, AL, USA
Md Tauhidur Rahman , Dept. of Electrical and Computer Engineering, University of Alabama in Huntsville, Huntsville, AL, USA
pp. 89-95

A compact energy-efficient pseudo-static camouflaged logic family (Abstract)

Prashanth Mohan , Department of Electrical and Computer Engineering, Carnegie Mellon University
N E C Akkaya , Department of Electrical and Computer Engineering, Carnegie Mellon University
Burak Erbagci , Department of Electrical and Computer Engineering, Carnegie Mellon University
Ken Mai , Department of Electrical and Computer Engineering, Carnegie Mellon University
pp. 96-102

CTCG: Charge-trap based camouflaged gates for reverse engineering prevention (Abstract)

Asmit De , The Pennsylvania State University, University Park, PA 16802
Anirudh Iyengar , The Pennsylvania State University, University Park, PA 16802
Mohammad Nasim I. Khan , The Pennsylvania State University, University Park, PA 16802
Sung-Hao Lin , The Pennsylvania State University, University Park, PA 16802
Sandeep Thirumala , Purdue University. West Lafavette. IN 47907
Swaroop Ghosh , The Pennsylvania State University, University Park, PA 16802
Sumeet Gupta , Purdue University. West Lafavette. IN 47907
pp. 103-110

Secure chip odometers using intentional controlled aging (Abstract)

Nail Etkin Can Akkaya , Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh PA 15213, USA
Burak Erbagci , Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh PA 15213, USA
Ken Mai , Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh PA 15213, USA
pp. 111-117

Fresh re-keying with strong PUFs: A new approach to side-channel security (Abstract)

Xiaodan Xi , Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA
Aydin Aysu , Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA
Michael Orshansky , Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA
pp. 118-125

Large scale RO PUF analysis over slice type, evaluation time and temperature on 28nm Xilinx FPGAs (Abstract)

Robert Hesselbarth , Fraunhofer Institute for Applied and Integrated Security (AISEC), Munich, Germany
Florian Wilde , Technical University of Munich (TUM), Munich, Germany
Chongyan Gu , Center for Secure Information Technologies (CSIT), Queen's University Belfast, Belfast, UK
Neil Hanley , Center for Secure Information Technologies (CSIT), Queen's University Belfast, Belfast, UK
pp. 126-133

Abnormal vehicle behavior induced using only fabricated informative CAN messages (Abstract)

Junko Takahashi , NTT Secure Platform Laboratories, Tokyo, Japan 180-8585
Masashi Tanaka , NTT Secure Platform Laboratories, Tokyo, Japan 180-8585
Hitoshi Fuji , NTT Secure Platform Laboratories, Tokyo, Japan 180-8585
Toshio Narita , NTT DATA MSE CORPORATION, Kanagawa, Japan 222-0033
Shunsuke Matsumoto , NTT DATA MSE CORPORATION, Kanagawa, Japan 222-0033
Hiroki Sato , NTT DATA MSE CORPORATION, Kanagawa, Japan 222-0033
pp. 134-137

A flexible leakage trace collection setup for arbitrary cryptographic IP cores (Abstract)

Athanassios Moschos , Electrical and Computer Engineering Dpt., University of Patras, Rion Campus, Greece
Apostolos P. Fournaris , Electrical and Computer Engineering Dpt., University of Patras, Rion Campus, Greece
Odysseas Koufopavlou , Electrical and Computer Engineering Dpt., University of Patras, Rion Campus, Greece
pp. 138-142

Chaos computing for mitigating side channel attack (Abstract)

Md. Badruddoja Majumder , Department of Electrical Engineering and Computer Science, University of Tennessee, Knoxville, Knoxville, Tennessee 37996 USA
Md Sakib Hasan , Department of Electrical Engineering and Computer Science, University of Tennessee, Knoxville, Knoxville, Tennessee 37996 USA
Mesbah Uddin , Department of Electrical Engineering and Computer Science, University of Tennessee, Knoxville, Knoxville, Tennessee 37996 USA
Garrett S. Rose , Department of Electrical Engineering and Computer Science, University of Tennessee, Knoxville, Knoxville, Tennessee 37996 USA
pp. 143-146

Comparison of cost of protection against differential power analysis of selected authenticated ciphers (Abstract)

William Diehl , Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA, U.S.A.
Abubakr Abdulgadir , Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA, U.S.A.
Farnoud Farahmand , Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA, U.S.A.
Jens-Peter Kaps , Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA, U.S.A.
Kris Gaj , Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA, U.S.A.
pp. 147-152

Delay model and machine learning exploration of a hardware-embedded delay PUF (Abstract)

Wenjie Che , Enthentica
Manel Martinez-Ramon , University of New Mexico
Fareena Saqib , University of North Carolina
Jim Plusquellic , University of New Mexico
pp. 153-158

Energy efficient and side-channel secure hardware architecture for lightweight cipher SIMON (Abstract)

Arvind Singh , Georgia Institute of Technology
Nikhil Chawla , Georgia Institute of Technology
Monodeep Kar , Georgia Institute of Technology
Saibal Mukhopadhyay , Georgia Institute of Technology
pp. 159-162

FPGA-oriented moving target defense against security threats from malicious FPGA tools (Abstract)

Zhiming Zhang , Dept. of ECE, University of New Hampshire, Durham, NH 03824, USA
Qiaoyan Yu , Dept. of ECE, University of New Hampshire, Durham, NH 03824, USA
Laurent Njilla , Cyber Assurance Branch, Air Force Research Laboratory, Rome, NY 13441, USA
Charles Kamhoua , Network Security Branch, Army Research Laboratory, Adelphi, MD 20783, USA
pp. 163-166

Hardware virtualization for protection against power analysis attack (Abstract)

Kai Yang , Florida Institute for Cybersecurity Research, University of Florida, Gainesville, Florida 32611
Jungmin Park , Florida Institute for Cybersecurity Research, University of Florida, Gainesville, Florida 32611
Mark Tehranipoor , Florida Institute for Cybersecurity Research, University of Florida, Gainesville, Florida 32611
Swarup Bhunia , Florida Institute for Cybersecurity Research, University of Florida, Gainesville, Florida 32611
pp. 167-172

Inverse gating for low energy encryption (Abstract)

Subhadeep Banik , LASEC, Ecole Polytechnique Federale de Lausanne, Switzerland
Andrey Bogdanov , DTU Compute, Technical University of Denmark, Lyngby, Denmark
Francesco Regazzoni , ALaRI - USI, University of Lugano, Switzerland
Takanori Isobe , University of Hyogo, Japan
Harunaga Hiwatari , Sony Corporation, Tokyo, Japan
Toru Akishita , Sony Corporation, Tokyo, Japan
pp. 173-176

Lowering the barrier to online malware detection through low frequency sampling of HPCs (Abstract)

Patrick Cronin , Department of Electrical and Computer Engineering, University of Delaware
Chengmo Yang , Department of Electrical and Computer Engineering, University of Delaware
pp. 177-180

On state encoding against power analysis attacks for finite state controllers (Abstract)

Richa Agrawal , Digital Design Environments Laboratory, School of Electronics and Computing Systems, University of Cincinnati, Cincinnati, Ohio USA
Ranga Vemuri , Digital Design Environments Laboratory, School of Electronics and Computing Systems, University of Cincinnati, Cincinnati, Ohio USA
pp. 181-186

Prefetch-guard: Leveraging hardware prefetches to defend against cache timing channels (Abstract)

Hongyu Fang , Department of Electrical and Computer Engineering, The George Washington University, Washington, DC, USA
Sai Santosh Dayapule , Department of Electrical and Computer Engineering, The George Washington University, Washington, DC, USA
Fan Yao , Department of Electrical and Computer Engineering, The George Washington University, Washington, DC, USA
Milos Doroslovacki , Department of Electrical and Computer Engineering, The George Washington University, Washington, DC, USA
Guru Venkataramani , Department of Electrical and Computer Engineering, The George Washington University, Washington, DC, USA
pp. 187-190

Protecting block ciphers against differential fault attacks without re-keying (Abstract)

Anubhab Baksi , School of Computer Science and Engineering, Nanyang Technological University, Singapore
Shivam Bhasin , Temasek Laboratories, Nanyang Technological University, Singapore
Jakub Breier , Temasek Laboratories, Nanyang Technological University, Singapore
Mustafa Khairallah , School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore
Thomas Peyrin , School of Computer Science and Engineering, Nanyang Technological University, Singapore
pp. 191-194

R2D2: Runtime reassurance and detection of A2 Trojan (Abstract)

Yumin Hou , Institute of Microelectronics, Tsinghua University, Beijing 100084, China
Hu He , Institute of Microelectronics, Tsinghua University, Beijing 100084, China
Kaveh Shamsi , Department of Electrical and Computer Engineering, University of Florida, USA
Yier Jin , Department of Electrical and Computer Engineering, University of Florida, USA
Dong Wu , Institute of Microelectronics, Tsinghua University, Beijing 100084, China
Huaqiang Wu , Institute of Microelectronics, Tsinghua University, Beijing 100084, China
pp. 195-200

Repurposing SoC analog circuitry for additional COTS hardware security (Abstract)

Adam Duncan , Intelligent Systems Engineering, Indiana University, Bloomington, Indiana 47401 USA
Lei Jiang , Intelligent Systems Engineering, Indiana University, Bloomington, Indiana 47401 USA
Martin Swany , Intelligent Systems Engineering, Indiana University, Bloomington, Indiana 47401 USA
pp. 201-204

RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning (Abstract)

Baibhab Chatterjee , School of Electrical and Computer Engineering, Purdue University, West Lafayette, Indiana - 47907, USA
Debayan Das , School of Electrical and Computer Engineering, Purdue University, West Lafayette, Indiana - 47907, USA
Shreyas Sen , School of Electrical and Computer Engineering, Purdue University, West Lafayette, Indiana - 47907, USA
pp. 205-208

Robust, low-cost, and accurate detection of recycled ICs using digital signatures (Abstract)

Mahabubul Alam , Department of Electrical and Computer Engineering, Auburn University, AL
Sreeja Chowdhury , Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL
Mark M. Tehranipoor , Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL
Ujjwal Guin , Department of Electrical and Computer Engineering, Auburn University, AL
pp. 209-214

SAT-based reverse engineering of gate-level schematics using fault injection and probing (Abstract)

Shahrzad Keshavarz , University of Massachusetts Amherst, USA
Falk Schellenberg , Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Bochum, Germany
Bastian Richte , Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Bochum, Germany
Christof Paar , Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Bochum, Germany
Daniel Holcomb , University of Massachusetts Amherst, USA
pp. 215-220

Self-authenticating secure boot for FPGAs (Abstract)

G. Pocklassery , Enthentica
W. Che , Enthentica
F. Saqib , University of North Carolina
M. Areno , Trusted and Secure Systems
J. Plusquellic , University of New Mexico
pp. 221-226

SIN2: Stealth infection on neural network — A low-cost agile neural Trojan attack methodology (Abstract)

Tao Liu , Florida International University
Wujie Wen , Florida International University
Yier Jin , University of Florida
pp. 227-230

Securing interconnected PUF network with reconfigurability (Abstract)

Hongxiang Gu , Department of Computer Science, University of California, Los Angeles, Los Angeles, CA, USA
Miodrag Potkonjak , Department of Computer Science, University of California, Los Angeles, Los Angeles, CA, USA
pp. 231-234

Value prediction for security (VPsec): Countering fault attacks in modern microprocessors (Abstract)

Rami Sheikh , Qualcomm Technologies, Inc
Ro Cammarota , Qualcomm Technologies, Inc
Wenjia Ruan , Qualcomm Technologies, Inc
pp. 235-238
189 ms
(Ver 3.3 (11022016))