The Community for Technology Leaders
2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (2017)
Mclean, VA, USA
May 1, 2017 to May 5, 2017
ISBN: 978-1-5386-3930-6
TABLE OF CONTENTS

[Front matter] (PDF)

pp. i-xxxiv

Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security (PDF)

Andre Schaller , Technische Universität Darmstadt and CYSEC, Darmstadt, Germany
Wenjie Xiong , Yale University, New Haven, CT, USA
Nikolaos Athanasios Anagnostopoulos , Technische Universität Darmstadt and CYSEC, Darmstadt, Germany
Muhammad Umair Saleem , Technische Universität Darmstadt and CYSEC, Darmstadt, Germany
Sebastian Gabmeyer , Technische Universität Darmstadt and CYSEC, Darmstadt, Germany
Stefan Katzenbeisser , Technische Universität Darmstadt and CYSEC, Darmstadt, Germany
Jakub Szefer , Yale University, New Haven, CT, USA
pp. 1-7

Hermes: Secure heterogeneous multicore architecture design (PDF)

Michel A. Kinsy , Adaptive and Secure Computing Systems (ASCS) Laboratory, Department of Electrical and Computer Engineering, Boston University
Shreeya Khadka , Adaptive and Secure Computing Systems (ASCS) Laboratory, Department of Electrical and Computer Engineering, Boston University
Mihailo Isakov , Adaptive and Secure Computing Systems (ASCS) Laboratory, Department of Electrical and Computer Engineering, Boston University
Anam Farrukh , Adaptive and Secure Computing Systems (ASCS) Laboratory, Department of Electrical and Computer Engineering, Boston University
pp. 14-20

Reviving instruction set randomization (PDF)

Kanad Sinha , Columbia University
Vasileios P. Kemerlis , Brown University
Simha Sethumadhavan , Columbia University
pp. 21-28

Creating security primitive by nanoscale manipulation of carbon nanotubes (PDF)

Zhaoying Hu , College of Nanoscale Science and Engineering, State University of New York at Albany, Albany, New York 12203, USA
Shu-Jen Han , IBM T. J. Watson Research Center, Yorktown Heights, New York 10598, USA
pp. 29-34

Automatic generation of high-performance modular multipliers for arbitrary mersenne primes on FPGAs (PDF)

Philipp Koppermann , Fraunhofer Research Institution AISEC, Munich, Germany
Fabrizio De Santis , Technische Universität München, Munich, Germany
Johann Heyszl , Fraunhofer Research Institution AISEC, Munich, Germany
Georg Sigl , Fraunhofer Research Institution AISEC, Munich, Germany
pp. 35-40

Efficient configurations for block ciphers with unified ENC/DEC paths (PDF)

Subhadeep Banik , Temasek Labs, Nanyang Technological University, Singapore
Andrey Bogdanov , DTU Compute, Technical University of Denmark, 2800 Kgs. Lyngby
Francesco Regazzoni , ALaRI - USI, via Buffi, 13, 6900, Lugano, Switzerland
pp. 41-46

Memory-constrained implementation of lattice-based encryption scheme on standard Java Card (PDF)

Ye Yuan , Graduate School of Mathematics, Kyushu University
Kazuhide Fukushima , KDDI Research, Inc.
Shinsaku Kiyomoto , KDDI Research, Inc.
Tsuyoshi Takagi , Institute of Mathematics for Industry, Kyushu University; CREST, Japan Science and Technology Agency
pp. 47-50

Towards a memristive hardware secure hash function (MemHash) (PDF)

Leonid Azriel , Viterbi Faculty of Electrical Engineering, Technion - Israel Institute of Technology, Haifa, Israel
Shahar Kvatinsky , Viterbi Faculty of Electrical Engineering, Technion - Israel Institute of Technology, Haifa, Israel
pp. 51-55

Stateless leakage resiliency from NLFSRs (PDF)

Mostafa Taha , Department of Electrical and Computer Engineering, Western University, London, ON, Canada
Arash Reyhani-Masoleh , Department of Electrical and Computer Engineering, Western University, London, ON, Canada
Patrick Schaumont , Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA, USA
pp. 56-61

High efficiency power side-channel attack immunity using noise injection in attenuated signature domain (PDF)

Debayan Das , School of Electrical and Computer Engineering, Purdue University, USA
Shovan Maity , School of Electrical and Computer Engineering, Purdue University, USA
Saad Bin Nasir , School of Electrical and Computer Engineering, Georgia Institute of Technology, USA
Santosh Ghosh , Intel Labs, Hillsboro, Oregon, USA
Arijit Raychowdhury , School of Electrical and Computer Engineering, Georgia Institute of Technology, USA
Shreyas Sen , School of Electrical and Computer Engineering, Purdue University, USA
pp. 62-67

Exploring timing side-channel attacks on path-ORAMs (PDF)

Chongxi Bao , Dept. of ECE, University of Maryland, College Park
Ankur Srivastava , Dept. of ECE, University of Maryland, College Park
pp. 68-73

Photonic side channel attacks against RSA (PDF)

Elad Carmon , Tel-Aviv University, Tel-Aviv 69978, Israel
Jean-Pierre Seifert , Security in Telecommunications, Technische Universität Berlin and FhG SIT, Darmstadt, Germany
Avishai Wool , Tel-Aviv University, Tel-Aviv 69978, Israel
pp. 74-78

Characterising a CPU fault attack model via run-time data analysis (PDF)

Martin S. Kelly , Information Security Group, Smart Card Centre, Royal Holloway, University of London, Egham, TW20 0EX, United Kingdom
Keith Mayes , Information Security Group, Smart Card Centre, Royal Holloway, University of London, Egham, TW20 0EX, United Kingdom
John F. Walker , DNV GL Ltd., Crescent House 46 Priestgate, Peterborough, PE1 1LF, United Kingdom
pp. 79-84

Breaking active-set backward-edge CFI (PDF)

Michael Theodorides , Department of Electrical Engineering and Computer Sciences, University of California, Berkeley
David Wagner , Department of Electrical Engineering and Computer Sciences, University of California, Berkeley
pp. 85-89

INFECT: INconspicuous FEC-based Trojan: A hardware attack on an 802.11a/g wireless network (PDF)

Kiruba Sankaran Subramani , Department of Electrical and Computer Engineering, The University of Texas at Dallas, Richardson, TX 75080
Angelos Antonopoulos , Department of Electrical and Computer Engineering, The University of Texas at Dallas, Richardson, TX 75080
Ahmed Attia Abotabl , Department of Electrical and Computer Engineering, The University of Texas at Dallas, Richardson, TX 75080
Aria Nosratinia , Department of Electrical and Computer Engineering, The University of Texas at Dallas, Richardson, TX 75080
Yiorgos Makris , Department of Electrical and Computer Engineering, The University of Texas at Dallas, Richardson, TX 75080
pp. 90-94

AppSAT: Approximately deobfuscating integrated circuits (PDF)

Kaveh Shamsi , Department of Electrical and Computer Engineering, University of Central Florida
Meng Li , Department of Electrical and Computer Engineering, University of Texas at Austin
Travis Meade , Department of Electrical and Computer Engineering, University of Central Florida
Zheng Zhao , Department of Electrical and Computer Engineering, University of Texas at Austin
David Z. Pan , Department of Electrical and Computer Engineering, University of Texas at Austin
Yier Jin , Department of Electrical and Computer Engineering, University of Central Florida
pp. 95-100

Challenging on-chip SRAM security with boot-state statistics (PDF)

Joseph McMahan , University of California, Santa Barbara
Weilong Cui , University of California, Santa Barbara
Liang Xia , Microsoft
Jeff Heckey , Avago Technologies
Frederic T. Chong , University of Chicago
Timothy Sherwood , University of California, Santa Barbara
pp. 101-105

A novel physiological features-assisted architecture for rapidly distinguishing health problems from hardware Trojan attacks and errors in medical devices (PDF)

Taimour Wehbe , School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia, USA
Vincent J. Mooney , School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia, USA
Abdul Qadir Javaid , School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia, USA
Omer T. Inan , School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia, USA
pp. 106-109

Using computational game theory to guide verification and security in hardware designs (PDF)

Andrew M. Smith , Digital and Quantum Information Systems, Sandia National Laboratories, Livermore, California 94551-0969
Jackson R. Mayo , Scalable Modeling and Analysis Systems, Sandia National Laboratories, Livermore, California 94551-0969
Vivian Kammler , Embedded Systems Analysis, Sandia National Laboratories, Albuquerque, NM 87185
Robert C. Armstrong , Digital and Quantum Information Systems, Sandia National Laboratories, Livermore, California 94551-0969
Yevgeniy Vorobeychik , Department of Computer Science, Vanderbilt University, Nashville, TN 37235
pp. 110-115

Physical unclonable functions and dynamic partial reconfiguration for security in resource-constrained embedded systems (PDF)

G. Pocklassery , ECE, Univ. of New Mexico, Albuquerque, NM
Venkata K Kajuruli , ECE, Univ. of New Mexico, Albuquerque, NM
J. Plusquellic , ECE, Univ. of New Mexico, Albuquerque, NM
F. Saqib , ECE, Florida Institute of Technology, Melbourne, FL
pp. 116-121

New clone-detection approach for RFID-based supply chains (PDF)

Hoda Maleki , University of Connecticut, USA
Reza Rahaeimehr , University of Connecticut, USA
Chenglu Jin , University of Connecticut, USA
Marten van Dijk , University of Connecticut, USA
pp. 122-127

Take a moment and have some t: Hypothesis testing on raw PUF data (Abstract)

Vincent Immler , Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching near Munich, Germany
Matthias Hiller , Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching near Munich, Germany
Johannes Obermaier , Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching near Munich, Germany
Georg Sigl , Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching near Munich, Germany
pp. 128-129

A new maskless debiasing method for lightweight physical unclonable functions (PDF)

Aydin Aysu , Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA
Ye Wang , Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA
Patrick Schaumont , Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA, USA
Michael Orshansky , Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA
pp. 134-139

A stochastic all-digital weak physically unclonable function for analog/mixed-signal applications (PDF)

Troy Bryant , Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida, USA
Sreeja Chowdhury , Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida, USA
Domenic Forte , Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida, USA
Mark Tehranipoor , Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida, USA
Nima Maghari , Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida, USA
pp. 140-145

Improving reliability of weak PUFs via circuit techniques to enhance mismatch (PDF)

Vinay C. Patil , Department of Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, USA
Arunkumar Vijayakumar , Department of Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, USA
Daniel E. Holcomb , Department of Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, USA
Sandip Kundu , Department of Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, USA
pp. 146-150

Ag conductive bridge RAMs for physical unclonable functions (PDF)

Bertrand Cambou , Northern Arizona University
Fatemeh Afghah , Northern Arizona University
Derek Sonderegger , Northern Arizona University
Jennifer Taggart , Arizona State University
Hugh Barnaby , Arizona State University
Michael Kozicki , Arizona State University
pp. 151

Fabrication security and trust of domain-specific ASIC processors (PDF)

Michael Vai , MIT Lincoln Laboratory, Lexington, MA, USA
Karen Gettings , MIT Lincoln Laboratory, Lexington, MA, USA
Theodore Lyszczarz , MIT Lincoln Laboratory, Lexington, MA, USA
pp. 152

LWE-based lossless computational fuzzy extractor for the Internet of Things (PDF)

Christopher Huth , Security and IT-Systems Group, Robert Bosch GmbH, Stuttgart, Germany
Daniela Becker , Robert Bosch LLC Research and Technology Center, Pittsburgh, USA
Jorge Guajardo , Robert Bosch LLC Research and Technology Center, Pittsburgh, USA
Paul Duplys , Security and IT-Systems Group, Robert Bosch GmbH, Stuttgart, Germany
Tim Guneysu , University of Bremen & DFKI, Bremen, Germany
pp. 154

Cache timing attacks on recent microarchitectures (PDF)

Alexandres Andreou , DTU Compute, Technical University of Denmark, 2800 Kgs. Lyngby
Andrey Bogdanov , DTU Compute, Technical University of Denmark, 2800 Kgs. Lyngby
Elmar Tischhauser , DTU Compute, Technical University of Denmark, 2800 Kgs. Lyngby
pp. 155

Analyzing security vulnerabilities of three-dimensional integrated circuits (PDF)

Jaya Dofe , Department of Electrical and Computer Engineering, University of New Hampshire, Durham, NH 03824, USA
Qiaoyan Yu , Department of Electrical and Computer Engineering, University of New Hampshire, Durham, NH 03824, USA
pp. 156

A novel offset method for improving bitstring quality of a Hardware-Embedded delay PUF (PDF)

Wenjie Che , ECE Department, University of New Mexico, Albuquerque, USA
Jim Plusquellic , ECE Department, University of New Mexico, Albuquerque, USA
Fareena Saqib , ECE Department, Florida Institute of Technology, Melbourne, USA
pp. 157

Malicious CAN-message attack against advanced driving assistant system (PDF)

Mitsuru Shiozaki , Research Organization of Science & Technology, Ritsumeikan University, Kusatsu, Shiga Japan
Takaya Kubota , Research Organization of Science & Technology, Ritsumeikan University, Kusatsu, Shiga Japan
Masashi Nakano , Dept. of Electronic and Computer Engineering, Ritsumeikan University, Kusatsu, Shiga, Japan
Yuuki Nakazawa , Dept. of Electronic and Computer Engineering, Ritsumeikan University, Kusatsu, Shiga, Japan
Takeshi Fujino , Dept. of Electronic and Computer Engineering, Ritsumeikan University, Kusatsu, Shiga, Japan
pp. 158

Improving FPGA based SHA-3 structures (PDF)

Magnus Sundal , INESC-ID, Instituto Superior Técnico, Universidade Lisboa
Ricardo Chaves , INESC-ID, Instituto Superior Técnico, Universidade Lisboa
pp. 159

On secure implementations of quantum-resistant supersingular isogeny Diffie-Hellman (PDF)

Brian Koziel , Texas Instruments, Dallas, TX, USA
Reza Azarderakhsh , Computer and Electrical Engineering and Computer Science, Florida Atlantic University, Boca Raton, FL, USA
David Jao , Combinatorics and Optimization, University of Waterloo, Waterloo, ON, Canada
pp. 160

Parameter biasing obfuscation for analog IP protection (PDF)

Vaibhav Venugopal Rao , Department of Electrical and Computer Engineering, Drexel University, Philadelphia, PA 19104
Ioannis Savidis , Department of Electrical and Computer Engineering, Drexel University, Philadelphia, PA 19104
pp. 161

Circuit recognition with deep learning (PDF)

Yu-Yun Dai , Department of EECS, University of California, Berkeley, U.S.A.
Robert K. Braytont , Department of EECS, University of California, Berkeley, U.S.A.
pp. 162

Detection of counterfeit ICs using public identification sequences (PDF)

Peter Samarin , Bonn-Rhein-Sieg University of Applied Sciences, Sankt Augustin, Germany
Kerstin Lemke-Rust , Bonn-Rhein-Sieg University of Applied Sciences, Sankt Augustin, Germany
pp. 163

Threshold voltage defined multi-input complex gates (PDF)

Asmit De , Pennsylvania State University, University Park, PA, USA
Swaroop Ghosh , Pennsylvania State University, University Park, PA, USA
pp. 164

Platform agnostic, scalable, and unobtrusive FPGA network processor design of moving target defense over IPv6 (MT6D) over IEEE 802.3 Ethernet (PDF)

Joseph Sagisi , Department of Electrical Engineering and Computer Engineering, Virginia Tech Blacksburg, USA
Joseph Tront , Department of Electrical Engineering and Computer Engineering, Virginia Tech Blacksburg, USA
Randy Marchany Bradley , Department of Electrical Engineering and Computer Engineering, Virginia Tech Blacksburg, USA
pp. 165

TTLock: Tenacious and traceless logic locking (PDF)

Muhammad Yasin , Electrical and Computer Engineering, NYU Tandon School of Engineering, NY, USA
Bodhisatwa Mazumdar , Discipline of Computer Science and Engineering, Indian Institute of Technology Indore, India
Jeyavijayan J V Rajendran , Department of Electrical and Computer Engineering, The University of Texas at Dallas, TX, USA
Ozgur Sinanoglu , Electrical and Computer Engineering, New York University Abu Dhabi, Abu Dhabi, U.A.E.
pp. 166

Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse (PDF)

Krishna Bagadia , Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur
Urbi Chatterjee , Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur
Debapriya Basu Roy , Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur
Debdeep Mukhopadhyay , Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur
Rajat Subhra Chakraborty , Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur
pp. 167

On designing optimal camouflaged layouts (PDF)

Thomas Broadfoot , Department of Electrical and Computer Engineering, The University of Texas at Dallas, Richardson, Texas, USA
Carl Sechen , Department of Electrical and Computer Engineering, The University of Texas at Dallas, Richardson, Texas, USA
Jeyavijayan J V Rajendran , Department of Electrical and Computer Engineering, The University of Texas at Dallas, Richardson, Texas, USA
pp. 169

Connecting the dots: Privacy leakage via write-access patterns to the main memory (PDF)

Tara John , University of Connecticut, USA
Syed Kamran Haider , University of Connecticut, USA
Hamza Omar , University of Connecticut, USA
Marten van Dijk , University of Connecticut, USA
pp. 170

Correlation power analysis attack against STT-MRAM based cyptosystems (PDF)

Abhishek Chakraborty , Department of Electrical and Computer Engineering, University of Maryland, College Park, USA
Ankit Mondal , Department of Electrical and Computer Engineering, University of Maryland, College Park, USA
Ankur Srivastava , Department of Electrical and Computer Engineering, University of Maryland, College Park, USA
pp. 171

Synthesis of hardware sandboxes for Trojan mitigation in systems on chip (PDF)

Christophe Bobda , University of Arkansas, Department of Computer Science and Computer Engineering Fayetteville, Arkansas
Taylor J L Whitaker , University of Arkansas, Department of Computer Science and Computer Engineering Fayetteville, Arkansas
Charles Kamhoua , Air Force Research Laboratory, Cyber Assurance Branch, Rome, New York
Kevin Kwiat , Air Force Research Laboratory, Cyber Assurance Branch, Rome, New York
Laurent Njilla , Air Force Research Laboratory, Cyber Assurance Branch, Rome, New York
pp. 172
89 ms
(Ver 3.3 (11022016))