TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
3 | |
3GPP | |
3PIP | |
A | |
ACL | |
advanced encryption standard | |
AE | |
AEAD | |
Aegis | |
AES | |
Aging | |
Air Gapped Network | |
Analog Hardware Trojan | |
Analog PUF | |
Analog/RF ICs | |
Application Inference | |
architecture | |
Ascon | |
ASIC | |
Authenticated encryption | |
Authentication | |
Autoencoder | |
B | |
Backscattering side channel | |
Backward Trust | |
Bias temperature instability | |
bitstream security | |
Blockchain | |
Bluetooth Low Energy Protocol Stack | |
BotNet | |
C | |
Cache Architecture | |
Cache Partitioning | |
CAESAR | |
chaos | |
Chaos-based random number generator | |
Circuit techniques | |
colm | |
Commodity Devices | |
Computer Aided Design | |
correlation power analysis | |
correlation power analysis (CPA) | |
Counterfeit ICs | |
Countermeasures | |
Covert Channel | |
Covert/side Channel Detection | |
Cryptanalysis | |
Cryptographic hardware | |
D | |
Data Privacy | |
denial-of-service | |
Design Obfuscation | |
Detection | |
Differential Power analysis | |
DVFS | |
Dynamic partial reconfiguration | |
dynamic reconfiguration | |
Dynamic voltage and frequency scaling | |
E | |
eCash protocol | |
Edge Device | |
Edge Security | |
electromagnetic | |
electromagnetic attack | |
electronic cash | |
EM attack | |
EM Emissions | |
EM Sensor | |
EM Side-channel attack | |
Embedded systems | |
Embedded Systems Security | |
Emerging NVM | |
Encrypted Execution | |
Encryption engines | |
energy harvesting | |
experimental cryptanalysis | |
experimental demonstration | |
F | |
Fast Fourier Transformation | |
fault attack | |
Fault detection | |
fault injection | |
Fault injection attack | |
Field Programmable Gate Array (FPGA) | |
finite field multiplier | |
flash memory | |
Formal Method | |
Formal methods | |
Forward Trust | |
FPGA | |
FPGAs | |
FSM Extraction | |
functional attack | |
Fuzzing | |
G | |
Generic countermeasure | |
Ground-up EM Leakage Modeling | |
H | |
hardware | |
hardware accelerators | |
hardware attack | |
Hardware Performance Counters | |
Hardware Reverse Engineering | |
Hardware Root-of-Trust | |
Hardware Security | |
hardware security tools | |
hardware security verification | |
Hardware Trojan | |
Hardware Trojans | |
Hardware Vulnerabilities | |
heterogeneous architectures | |
Holistic Platform | |
HW/SW Co-Design | |
I | |
IC camouflaging | |
Image Analysis | |
ineffective fault | |
Information Flow | |
information flow tracking | |
infrared | |
Integrated Circuit | |
intermittent computing | |
Internet of Things | |
IoT | |
IoT security | |
IP Trust Verification | |
L | |
laser injection | |
Lattice-based Cryptography | |
leakage | |
Lightweight Cryptography | |
Localized EM attacks | |
logic encryption | |
logic locking | |
Logic obfuscation | |
Logic synthesis | |
Logic Test | |
Long-Short-Term-Memory | |
Low voltage error | |
low-complexity | |
Low-power | |
Low-Power Design | |
M | |
Machine Learning | |
Malware detection | |
Manufacture Usage Description | |
Master slave synchronization of chaotic systems | |
Meltdown | |
Micro-Architectural attacks | |
Micro-architecture | |
Microscopy | |
MILENAGE | |
Morus | |
MUD | |
Multi-party computation | |
multi-tenant | |
N | |
Nearest-neighbor search | |
NetFPGA | |
network vulnerabilities | |
No-equilibrium chaotic system | |
Nuclear Quadrupole Resonance (NQR) | |
Number Theoretic Transform | |
NVM | |
O | |
Obfuscation | |
On-Chip Sensor | |
optimization | |
P | |
parity bit | |
Partial Reconfiguration | |
Partially Homomorphic Encryption | |
Penetration testing | |
Physical Unclonable Function (PUF) | |
Physical unclonable functions | |
Physically Unclonable Function (PUF) | |
Piezo Sensors | |
Power | |
power analysis attack | |
Power attack | |
power distribution network (PDN) | |
power tracer | |
Private-set intersection | |
Process Variation | |
Proximity Attack | |
PUF | |
PUFs | |
Q | |
Quantitative Information-Flow | |
R | |
Random bit generator | |
random number generator | |
Ransomware | |
Real-time Security | |
Reconfigurable Fabric | |
Recycled IC | |
Resonance | |
resource-constrained microcontroller | |
Reverse Engineering | |
Ring-oscillator (RO) | |
RISC-V | |
S | |
SAT | |
SAT Attack | |
SAT attacks | |
Secure auction | |
Secure Caches | |
secure intermittent architecture | |
Secure Processor Architectures | |
Secure voting | |
secureboot | |
security | |
Security and Trust | |
Security architecture | |
Security Language | |
Security policies | |
Security primitives | |
security property languages | |
Sequential Reverse Engineering | |
Side Channel Analysis | |
side channel analysis attacks | |
Side Channel Attacks | |
side channel countermeasures | |
Side-Channel | |
Side-channel Analysis | |
side-channel attack | |
Side-channel attacks | |
Side-Channel Leakage | |
SIFA | |
Signal Processing | |
Signature Attenuation Hardware | |
smart contract | |
Snapdragon | |
SoC | |
Spectral Features | |
Spectre | |
Spectroscopy | |
Split Manufacturing | |
SRAM | |
Stable Matching | |
State Register Identification | |
statistical fault analysis | |
statistical security models | |
STELLAR | |
structural attack | |
system level attack | |
System Monitoring | |
System-on-Chip security | |
T | |
taint tracking | |
tamper detection | |
Test chip and Measurement | |
three-dimensional (3D) integration | |
Time-Series | |
Toeplitz matrix-vector product | |
TPM | |
Transistor-level Programming | |
Trigger circuit | |
Trojan | |
trust | |
TrustZone | |
U | |
Unclonable | |
Unrolled Architectures | |
USIM | |
V | |
verification | |
Voltage differential | |
Vulnerability Database | |
W | |
watermarking | |
Z | |
zynq | |
Zynq-7000 |