default search action
WESS 2014: New Delhi, India
- Ting Yu, Shengqi Yang:
Proceedings of the 9th Workshop on Embedded Systems Security, WESS '14, New Delhi, India, October 17, 2014. ACM 2014, ISBN 978-1-4503-2932-3 - Anju P. Johnson, Sayandeep Saha, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay, Sezer Gören:
Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet. 1:1-1:8 - Marilyn Wolf, Saibal Mukhopadhyay:
Information theoretic models for signatures in VLSI power delivery systems. 2:1-2:5 - Aderinola Gbade-Alabi, David C. Keezer, Vincent John Mooney, Axel York Poschmann, Marc Stöttinger, Kshitij Divekar:
A signature based architecture for Trojan detection. 3:1-3:10 - João Amaral, Francesco Regazzoni, Pedro Tomás, Ricardo Chaves:
Accelerating differential power analysis on heterogeneous systems. 4:1-4:9 - Andreas Papalambrou, Kyriakos Stefanidis, John V. Gialelis, Dimitrios N. Serpanos:
Detection, traceback and filtering of denial of service attacks in networked embedded systems. 5:1-5:8 - Oscar M. Guillen, Ralf Brederlow, Ralph Ledwa, Georg Sigl:
Risk management in embedded devices using metering applications as example. 6:1-6:9 - Xuan Thuy Ngo, Sylvain Guilley, Shivam Bhasin, Jean-Luc Danger, Zakaria Najm:
Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horses. 7:1-7:10 - Bodhisatwa Mazumdar:
Some RSSB constructions with improved resistance towards differential power analysis. 8:1-8:3 - Debasri Saha, Susmita Sur-Kolay:
Trusted sharing of intellectual property in electronic hardware design. 9:1-9:3
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.