The TRUDEVICE Conference will provide an environment for researchers from academic and industrial domains who want to discuss recent findings, theories and on-going work regarding all aspects of hardware security including design, manufacturing, testing, reliability, validation and utilization.

Envíos recientes

  • On the Hardware Implementation Efficiency of CAESAR Authentication Ciphers for FPGA Devices 

    Sklavos, Nicolas; Kitsos, Paris; Voyiatzis, Artemios G. (2016-11-16)
    Texto en actas de congreso
    Acceso abierto
  • Committees 

    Universitat Politècnica de Catalunya. Departament d'Enginyeria Electrònica (2016-11-14)
    Texto en actas de congreso
    Acceso abierto
  • Welcome 

    Natale, Giorgio Di (2016-11-14)
    Texto en actas de congreso
    Acceso abierto
  • Program 

    Universitat Politècnica de Catalunya. Departament d'Enginyeria Electrònica (2016-11-14)
    Texto en actas de congreso
    Acceso abierto
  • Keynote Speech 

    Marshall, Richard (2016-11-14)
    Texto en actas de congreso
    Acceso abierto
  • Invited Speaker 

    Pehl, Michael (2016-11-16)
    Texto en actas de congreso
    Acceso abierto
  • H.264 Motion Vectors Based Cyber Defense/Attack Techniques 

    Hadar, Ofer; Segal, Rami; Birman, Raz (2016-11-15)
    Texto en actas de congreso
    Acceso abierto
  • Experimental results on smartcards’ IC EM radiation 

    Mendo, N.; Nuevo, R.; Hernández, D. (2016-11-15)
    Texto en actas de congreso
    Acceso abierto
  • On the Machine Learning Techniques for Side-channel Analysis 

    Picek, Stjepan; Heuser, Annelie; Guilley, Sylvain (2016-11-16)
    Texto en actas de congreso
    Acceso abierto
    Side-channel attacks represent one of the most powerful category of attacks on cryptographic devices with profiled attacks in a prominent place as the most powerful among them. Indeed, for instance, template attack is ...
  • Trojans in Early Design Steps—An Emerging Threat 

    Polian, Ilia; Becker, Georg T.; Regazzoni, Francesco (2016-11-16)
    Texto en actas de congreso
    Acceso abierto
    Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks ...
  • Secure Silicon: Towards Virtual Prototyping 

    Sauvage, Laurent; Takarabt, Sofiane; Souissi, Youssef (2016-11-14)
    Texto en actas de congreso
    Acceso abierto
    Evaluating security vulnerabilities of software implementations at design step is of primary importance for applications developers, while it has received litte attention from scientific communauty. In this paper, we ...
  • Security Evaluation of Cyber-Physical Systems in Society- Critical Internet of Things 

    Izosimov, Viacheslav; Törngren, Martin (2016-11-15)
    Texto en actas de congreso
    Acceso abierto
    In this paper, we present evaluation of security awareness of developers and users of cyber-physical systems. Our study includes interviews, workshops, surveys and one practical evaluation. We conducted 15 interviews ...

Muestra más