HOST 2019: INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

3
3GPP
3PIP
A
ACL
advanced encryption standard
AE
AEAD
Aegis
AES
Aging
Air Gapped Network
Analog Hardware Trojan
Analog PUF
Analog/RF ICs
Application Inference
architecture
Ascon
ASIC
Authenticated encryption
Authentication
Autoencoder
B
Backscattering side channel
Backward Trust
Bias temperature instability
bitstream security
Blockchain
Bluetooth Low Energy Protocol Stack
BotNet
C
Cache Architecture
Cache Partitioning
CAESAR
chaos
Chaos-based random number generator
Circuit techniques
colm
Commodity Devices
Computer Aided Design
correlation power analysis
correlation power analysis (CPA)
Counterfeit ICs
Countermeasures
Covert Channel
Covert/side Channel Detection
Cryptanalysis
Cryptographic hardware
D
Data Privacy
denial-of-service
Design Obfuscation
Detection
Differential Power analysis
DVFS
Dynamic partial reconfiguration
dynamic reconfiguration
Dynamic voltage and frequency scaling
E
eCash protocol
Edge Device
Edge Security
electromagnetic
electromagnetic attack
electronic cash
EM attack
EM Emissions
EM Sensor
EM Side-channel attack
Embedded systems
Embedded Systems Security
Emerging NVM
Encrypted Execution
Encryption engines
energy harvesting
experimental cryptanalysis
experimental demonstration
F
Fast Fourier Transformation
fault attack
Fault detection
fault injection
Fault injection attack
Field Programmable Gate Array (FPGA)
finite field multiplier
flash memory
Formal Method
Formal methods
Forward Trust
FPGA
FPGAs
FSM Extraction
functional attack
Fuzzing
G
Generic countermeasure
Ground-up EM Leakage Modeling
H
hardware
hardware accelerators
hardware attack
Hardware Performance Counters
Hardware Reverse Engineering
Hardware Root-of-Trust
Hardware Security
hardware security tools
hardware security verification
Hardware Trojan
Hardware Trojans
Hardware Vulnerabilities
heterogeneous architectures
Holistic Platform
HW/SW Co-Design
I
IC camouflaging
Image Analysis
ineffective fault
Information Flow
information flow tracking
infrared
Integrated Circuit
intermittent computing
Internet of Things
IoT
IoT security
IP Trust Verification
L
laser injection
Lattice-based Cryptography
leakage
Lightweight Cryptography
Localized EM attacks
logic encryption
logic locking
Logic obfuscation
Logic synthesis
Logic Test
Long-Short-Term-Memory
Low voltage error
low-complexity
Low-power
Low-Power Design
M
Machine Learning
Malware detection
Manufacture Usage Description
Master slave synchronization of chaotic systems
Meltdown
Micro-Architectural attacks
Micro-architecture
Microscopy
MILENAGE
Morus
MUD
Multi-party computation
multi-tenant
N
Nearest-neighbor search
NetFPGA
network vulnerabilities
No-equilibrium chaotic system
Nuclear Quadrupole Resonance (NQR)
Number Theoretic Transform
NVM
O
Obfuscation
On-Chip Sensor
optimization
P
parity bit
Partial Reconfiguration
Partially Homomorphic Encryption
Penetration testing
Physical Unclonable Function (PUF)
Physical unclonable functions
Physically Unclonable Function (PUF)
Piezo Sensors
Power
power analysis attack
Power attack
power distribution network (PDN)
power tracer
Private-set intersection
Process Variation
Proximity Attack
PUF
PUFs
Q
Quantitative Information-Flow
R
Random bit generator
random number generator
Ransomware
Real-time Security
Reconfigurable Fabric
Recycled IC
Resonance
resource-constrained microcontroller
Reverse Engineering
Ring-oscillator (RO)
RISC-V
S
SAT
SAT Attack
SAT attacks
Secure auction
Secure Caches
secure intermittent architecture
Secure Processor Architectures
Secure voting
secureboot
security
Security and Trust
Security architecture
Security Language
Security policies
Security primitives
security property languages
Sequential Reverse Engineering
Side Channel Analysis
side channel analysis attacks
Side Channel Attacks
side channel countermeasures
Side-Channel
Side-channel Analysis
side-channel attack
Side-channel attacks
Side-Channel Leakage
SIFA
Signal Processing
Signature Attenuation Hardware
smart contract
Snapdragon
SoC
Spectral Features
Spectre
Spectroscopy
Split Manufacturing
SRAM
Stable Matching
State Register Identification
statistical fault analysis
statistical security models
STELLAR
structural attack
system level attack
System Monitoring
System-on-Chip security
T
taint tracking
tamper detection
Test chip and Measurement
three-dimensional (3D) integration
Time-Series
Toeplitz matrix-vector product
TPM
Transistor-level Programming
Trigger circuit
Trojan
trust
TrustZone
U
Unclonable
Unrolled Architectures
USIM
V
verification
Voltage differential
Vulnerability Database
W
watermarking
Z
zynq
Zynq-7000