PROOFS 2017:Keyword Index

KeywordPapers
A
ARMv8Compositional Verification of Security Properties for Embedded Execution Platforms
asymmetric leakageAutomatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands
B
block cipherAn Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach
C
countermeasureAutomatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands
D
Data MiningAn Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach
decompositionCompositional Verification of Security Properties for Embedded Execution Platforms
Differential Fault AttackAn Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach
E
ECCAutomatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands
F
field multiplicationsAutomatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands
formal evaluationSymbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes
formal verificationCompositional Verification of Security Properties for Embedded Execution Platforms
H
hardware platformCompositional Verification of Security Properties for Embedded Execution Platforms
HCCAAutomatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands
HypervisorCompositional Verification of Security Properties for Embedded Execution Platforms
M
machine learningWhy Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
MaskingSymbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes
P
PAC learningWhy Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
Physical Unclonable FunctionsWhy Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
S
security analysisSymbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes
Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
side-channel attacksSymbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes
SoCCompositional Verification of Security Properties for Embedded Execution Platforms
System SecurityCompositional Verification of Security Properties for Embedded Execution Platforms