TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| 3 | |
| 3GPP | |
| 3PIP | |
| A | |
| ACL | |
| advanced encryption standard | |
| AE | |
| AEAD | |
| Aegis | |
| AES | |
| Aging | |
| Air Gapped Network | |
| Analog Hardware Trojan | |
| Analog PUF | |
| Analog/RF ICs | |
| Application Inference | |
| architecture | |
| Ascon | |
| ASIC | |
| Authenticated encryption | |
| Authentication | |
| Autoencoder | |
| B | |
| Backscattering side channel | |
| Backward Trust | |
| Bias temperature instability | |
| bitstream security | |
| Blockchain | |
| Bluetooth Low Energy Protocol Stack | |
| BotNet | |
| C | |
| Cache Architecture | |
| Cache Partitioning | |
| CAESAR | |
| chaos | |
| Chaos-based random number generator | |
| Circuit techniques | |
| colm | |
| Commodity Devices | |
| Computer Aided Design | |
| correlation power analysis | |
| correlation power analysis (CPA) | |
| Counterfeit ICs | |
| Countermeasures | |
| Covert Channel | |
| Covert/side Channel Detection | |
| Cryptanalysis | |
| Cryptographic hardware | |
| D | |
| Data Privacy | |
| denial-of-service | |
| Design Obfuscation | |
| Detection | |
| Differential Power analysis | |
| DVFS | |
| Dynamic partial reconfiguration | |
| dynamic reconfiguration | |
| Dynamic voltage and frequency scaling | |
| E | |
| eCash protocol | |
| Edge Device | |
| Edge Security | |
| electromagnetic | |
| electromagnetic attack | |
| electronic cash | |
| EM attack | |
| EM Emissions | |
| EM Sensor | |
| EM Side-channel attack | |
| Embedded systems | |
| Embedded Systems Security | |
| Emerging NVM | |
| Encrypted Execution | |
| Encryption engines | |
| energy harvesting | |
| experimental cryptanalysis | |
| experimental demonstration | |
| F | |
| Fast Fourier Transformation | |
| fault attack | |
| Fault detection | |
| fault injection | |
| Fault injection attack | |
| Field Programmable Gate Array (FPGA) | |
| finite field multiplier | |
| flash memory | |
| Formal Method | |
| Formal methods | |
| Forward Trust | |
| FPGA | |
| FPGAs | |
| FSM Extraction | |
| functional attack | |
| Fuzzing | |
| G | |
| Generic countermeasure | |
| Ground-up EM Leakage Modeling | |
| H | |
| hardware | |
| hardware accelerators | |
| hardware attack | |
| Hardware Performance Counters | |
| Hardware Reverse Engineering | |
| Hardware Root-of-Trust | |
| Hardware Security | |
| hardware security tools | |
| hardware security verification | |
| Hardware Trojan | |
| Hardware Trojans | |
| Hardware Vulnerabilities | |
| heterogeneous architectures | |
| Holistic Platform | |
| HW/SW Co-Design | |
| I | |
| IC camouflaging | |
| Image Analysis | |
| ineffective fault | |
| Information Flow | |
| information flow tracking | |
| infrared | |
| Integrated Circuit | |
| intermittent computing | |
| Internet of Things | |
| IoT | |
| IoT security | |
| IP Trust Verification | |
| L | |
| laser injection | |
| Lattice-based Cryptography | |
| leakage | |
| Lightweight Cryptography | |
| Localized EM attacks | |
| logic encryption | |
| logic locking | |
| Logic obfuscation | |
| Logic synthesis | |
| Logic Test | |
| Long-Short-Term-Memory | |
| Low voltage error | |
| low-complexity | |
| Low-power | |
| Low-Power Design | |
| M | |
| Machine Learning | |
| Malware detection | |
| Manufacture Usage Description | |
| Master slave synchronization of chaotic systems | |
| Meltdown | |
| Micro-Architectural attacks | |
| Micro-architecture | |
| Microscopy | |
| MILENAGE | |
| Morus | |
| MUD | |
| Multi-party computation | |
| multi-tenant | |
| N | |
| Nearest-neighbor search | |
| NetFPGA | |
| network vulnerabilities | |
| No-equilibrium chaotic system | |
| Nuclear Quadrupole Resonance (NQR) | |
| Number Theoretic Transform | |
| NVM | |
| O | |
| Obfuscation | |
| On-Chip Sensor | |
| optimization | |
| P | |
| parity bit | |
| Partial Reconfiguration | |
| Partially Homomorphic Encryption | |
| Penetration testing | |
| Physical Unclonable Function (PUF) | |
| Physical unclonable functions | |
| Physically Unclonable Function (PUF) | |
| Piezo Sensors | |
| Power | |
| power analysis attack | |
| Power attack | |
| power distribution network (PDN) | |
| power tracer | |
| Private-set intersection | |
| Process Variation | |
| Proximity Attack | |
| PUF | |
| PUFs | |
| Q | |
| Quantitative Information-Flow | |
| R | |
| Random bit generator | |
| random number generator | |
| Ransomware | |
| Real-time Security | |
| Reconfigurable Fabric | |
| Recycled IC | |
| Resonance | |
| resource-constrained microcontroller | |
| Reverse Engineering | |
| Ring-oscillator (RO) | |
| RISC-V | |
| S | |
| SAT | |
| SAT Attack | |
| SAT attacks | |
| Secure auction | |
| Secure Caches | |
| secure intermittent architecture | |
| Secure Processor Architectures | |
| Secure voting | |
| secureboot | |
| security | |
| Security and Trust | |
| Security architecture | |
| Security Language | |
| Security policies | |
| Security primitives | |
| security property languages | |
| Sequential Reverse Engineering | |
| Side Channel Analysis | |
| side channel analysis attacks | |
| Side Channel Attacks | |
| side channel countermeasures | |
| Side-Channel | |
| Side-channel Analysis | |
| side-channel attack | |
| Side-channel attacks | |
| Side-Channel Leakage | |
| SIFA | |
| Signal Processing | |
| Signature Attenuation Hardware | |
| smart contract | |
| Snapdragon | |
| SoC | |
| Spectral Features | |
| Spectre | |
| Spectroscopy | |
| Split Manufacturing | |
| SRAM | |
| Stable Matching | |
| State Register Identification | |
| statistical fault analysis | |
| statistical security models | |
| STELLAR | |
| structural attack | |
| system level attack | |
| System Monitoring | |
| System-on-Chip security | |
| T | |
| taint tracking | |
| tamper detection | |
| Test chip and Measurement | |
| three-dimensional (3D) integration | |
| Time-Series | |
| Toeplitz matrix-vector product | |
| TPM | |
| Transistor-level Programming | |
| Trigger circuit | |
| Trojan | |
| trust | |
| TrustZone | |
| U | |
| Unclonable | |
| Unrolled Architectures | |
| USIM | |
| V | |
| verification | |
| Voltage differential | |
| Vulnerability Database | |
| W | |
| watermarking | |
| Z | |
| zynq | |
| Zynq-7000 | |