{"id":329,"date":"2022-01-24T10:36:47","date_gmt":"2022-01-24T10:36:47","guid":{"rendered":"https:\/\/green-ic.org\/SOCure\/?page_id=329"},"modified":"2024-05-14T09:45:34","modified_gmt":"2024-05-14T09:45:34","slug":"impact","status":"publish","type":"page","link":"https:\/\/green-ic.org\/SOCure\/impact\/","title":{"rendered":"IMPACT"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"329\" class=\"elementor elementor-329\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9d60731 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9d60731\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6dd5830\" data-id=\"6dd5830\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ddc630e elementor-widget elementor-widget-heading\" data-id=\"ddc630e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Videos<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6f8313c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6f8313c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3022d42\" data-id=\"3022d42\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e649c97 elementor-widget elementor-widget-video\" data-id=\"e649c97\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=MORtmDNfRDU&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3678a6d\" data-id=\"3678a6d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1eee29a elementor-widget elementor-widget-video\" data-id=\"1eee29a\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=_cBzb4uguQM&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-33e6dab elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"33e6dab\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a80fe8\" data-id=\"6a80fe8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-636f6e4 elementor-widget elementor-widget-spacer\" data-id=\"636f6e4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-74d6464 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"74d6464\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-85fbd12\" data-id=\"85fbd12\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dc18264 elementor-widget elementor-widget-video\" data-id=\"dc18264\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=WPEKcT9sm1k&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9f50a8d\" data-id=\"9f50a8d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-534feaa elementor-widget elementor-widget-video\" data-id=\"534feaa\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=VmC2-QbcL88&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-13c0482 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"13c0482\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5d87420\" data-id=\"5d87420\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49ebf88 elementor-widget elementor-widget-spacer\" data-id=\"49ebf88\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-078fc0f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"078fc0f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-035288d\" data-id=\"035288d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fdbfce5 elementor-widget elementor-widget-video\" data-id=\"fdbfce5\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=T5OGc-PlbSQ&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9cb0db3\" data-id=\"9cb0db3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-05221cf elementor-widget elementor-widget-video\" data-id=\"05221cf\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=-55Wt_PrNIM&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-14aad15 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"14aad15\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a9bfc2\" data-id=\"6a9bfc2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-adb2d56 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"adb2d56\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e739ad2\" data-id=\"e739ad2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8de364a elementor-widget elementor-widget-video\" data-id=\"8de364a\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=76bv45FVLIs&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-865d6b9\" data-id=\"865d6b9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-756c701 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"756c701\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d407968\" data-id=\"d407968\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-45d836f elementor-widget elementor-widget-spacer\" data-id=\"45d836f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c6d0db8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c6d0db8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0599e90\" data-id=\"0599e90\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73699a7 elementor-widget elementor-widget-heading\" data-id=\"73699a7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Publications<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3464e65 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3464e65\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-68ffbce\" data-id=\"68ffbce\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c41e9f7 elementor-widget elementor-widget-text-editor\" data-id=\"c41e9f7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\n<table id=\"tablepress-1\" class=\"tablepress tablepress-id-1\">\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-1\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\">F. Berti, S. Bhasin, J. Breier, Xiaolu Hou, R. Poussier, F.-X. Standaert, B. Udvarhelyi, A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB, to appear in IACR Transactions on Cryptographic Hardware and Embedded Systems 2022<\/td>\n<\/tr>\n<tr class=\"row-2\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\">Breier, Jakub, Dirmanto Jap, Xiaolu Hou, and Shivam Bhasin. &#8220;On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms.&#8221; IEEE Transactions on Information Forensics and Security (2019)<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\">Bhasin, Shivam, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, and Siang Meng Sim. &#8220;SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers.&#8221; IACR Transactions on Cryptographic Hardware and Embedded Systems (2020): 95-122.<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\">Alam, Manaar, Arnab Bag, Debapriya Basu Roy, Dirmanto Jap, Jakub Breier, Shivam Bhasin, and Debdeep Mukhopadhyay. &#8220;Neural Network-based Inherently Fault-tolerant Hardware Cryptographic Primitives without Explicit Redundancy Checks.&#8221; ACM Journal on Emerging Technologies in Computing Systems (JETC) 17, no. 1 (2020): 1-30.<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\">Kumar, Vinay BY, Suman Deb, Naina Gupta, Shivam Bhasin, Jawad Haj-Yahya, Anupam Chattopadhyay, and Avi Mendelson. &#8220;Towards Designing a Secure RISC-V System-on-Chip: ITUS.&#8221; Journal of Hardware and Systems Security 4, no. 4 (2020): 329-342.<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\">Breier, Jakub, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin, and Yang Liu. &#8220;SNIFF: reverse engineering of neural networks with fault attacks.&#8221; IEEE Transactions on Reliability (2021).<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">7<\/td><td class=\"column-2\">Hou, X., Breier, J., &amp; Bhasin, S. (2022). SBCMA: Semi-Blind Combined Middle-Round Attack on Bit-Permutation Ciphers With Application to AEAD Schemes.\u00a0IEEE Transactions on Information Forensics and Security,\u00a017, 3677-3690.<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">8<\/td><td class=\"column-2\">Ravi, P., Yang, B., Bhasin, S., Zhang, F., &amp; Chattopadhyay, A. (2023). Fiddling the Twiddle Constants-Fault Injection Analysis of the Number Theoretic Transform.\u00a0IACR Transactions on Cryptographic Hardware and Embedded Systems, 447-481.<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">9<\/td><td class=\"column-2\">Picek, S., Heuser, A., Jovic, A., Bhasin, S., &amp; Regazzoni, F. (2023). Tipping the Balance: Imbalanced Classes in Deep Learning Side-channel Analysis.\u00a0IEEE Design &amp; Test.<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">10<\/td><td class=\"column-2\">Bagheri, N., Sadeghi, S., Ravi, P., Bhasin, S., &amp; Soleimany, H. (2022). SIPFA: statistical ineffective persistent faults analysis on Feistel ciphers.\u00a0IACR Transactions on Cryptographic Hardware and Embedded Systems, 367-390.<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">11<\/td><td class=\"column-2\">invited paper: M. Alioto, \u201cTrends in Hardware Security: from Basics to ASICs,&#8221; IEEE Solid-State Circuits Magazine (invited), vol. 11, no. 3, pp. 56-74, Aug. 2019<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">12<\/td><td class=\"column-2\">S. Taneja, M. Alioto, \u201cFully-Synthesizable All-Digital Unified Dynamic Entropy Generation, Extraction and Utilization within the Same Cryptographic Core,\u201d IEEE Solid-State Circuits Letters (invited), vol. 3, pp. 402-405, Sept. 2020<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">13<\/td><td class=\"column-2\">A Power-Aware Toggling-Frequency Actuator in Data-Toggling SRAM for Secure Data Protection<\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">14<\/td><td class=\"column-2\">Dual-Hiding Side-Channel-Attack Resistant FPGA-Based Asynchronous-Logic AES: Design, Countermeasures and Evaluation<\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">15<\/td><td class=\"column-2\">A Novel Normalized Variance-Based Differential Power Analysis Against Masking Countermeasures<\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">16<\/td><td class=\"column-2\">&#8220;PQC Acceleration Using GPUs:<br \/>\n FrodoKEM, NewHope, and Kyber&#8221;<\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">17<\/td><td class=\"column-2\">INVITED PAPER: S. Taneja, V. Konandur Rajanna, M. Alioto, \u201cIn-Memory Unified TRNG and Multi-Bit PUF for Ubiquitous Hardware Security,\u201d IEEE Journal of Solid-State Circuits (invited), vol. 57, no. 1, pp. 153-166, Jan. 2022<\/td>\n<\/tr>\n<tr class=\"row-18\">\n\t<td class=\"column-1\">18<\/td><td class=\"column-2\">&#8220;MemEnc: A Lightweight, Low-Power, and Transparent Memory Encryption Engine<br \/>\nfor IoT&#8221;<\/td>\n<\/tr>\n<tr class=\"row-19\">\n\t<td class=\"column-1\">19<\/td><td class=\"column-2\">&#8220;Protecting Network-on-Chip<br \/>\nIntellectual Property using Timing Channel Fingerprinting&#8221;<\/td>\n<\/tr>\n<tr class=\"row-20\">\n\t<td class=\"column-1\">20<\/td><td class=\"column-2\">A Highly Secure FPGA-Based Dual-Hiding Asynchronous-Logic AES Accelerator Against Side-Channel Attacks<\/td>\n<\/tr>\n<tr class=\"row-21\">\n\t<td class=\"column-1\">21<\/td><td class=\"column-2\">Bagheri, N., Sadeghi, S., Ravi, P., Bhasin, S., &amp; Soleimany, H. (2022). SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers. IACR Transactions on Cryptographic Hardware and Embedded Systems, 367-390.<\/td>\n<\/tr>\n<tr class=\"row-22\">\n\t<td class=\"column-1\">22<\/td><td class=\"column-2\">&#8220;S. Taneja, M. Alioto, &#8220;&#8221;Run-Time PUF Adaptation for Resilient and Energy-Efficient Key Generation via Sensor Fusion and Machine Learning,&#8221;&#8221; accepted to JSSC<br \/>\n&#8220;<\/td>\n<\/tr>\n<tr class=\"row-23\">\n\t<td class=\"column-1\">23<\/td><td class=\"column-2\">M. Alioto, \u201cAggressive Design Reuse for Ubiquitous Zero-Trust Edge Security \u2013 From Physical Design to Machine Learning-Based Hardware Patching,\u201d IEEE Open Journal of the Solid-State Circuits Society (invited), vol. 3, pp. 1-16, 2023<\/td>\n<\/tr>\n<tr class=\"row-24\">\n\t<td class=\"column-1\">24<\/td><td class=\"column-2\">Laser Voltage Probing Attack Detection with 100% Area\/Time Coverage at Above\/Below the Bandgap Wavelength and Fully-Automated Design<\/td>\n<\/tr>\n<tr class=\"row-25\">\n\t<td class=\"column-1\">25<\/td><td class=\"column-2\">AI Attacks AI: Recovering Neural Network architecture from NVDLA using AI-assisted Side Channel Attack<\/td>\n<\/tr>\n<tr class=\"row-26\">\n\t<td class=\"column-1\">26<\/td><td class=\"column-2\">S. Taneja, M. Alioto, Immersed-in-logic and in-memory primitives for ubiquitous hardware security, Springer, 2024<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-1 from cache -->\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8566356 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8566356\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4fb7562\" data-id=\"4fb7562\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b0669ea elementor-widget elementor-widget-spacer\" data-id=\"b0669ea\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8c3f058 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8c3f058\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-01a45a7\" data-id=\"01a45a7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6589cd3 elementor-widget elementor-widget-heading\" data-id=\"6589cd3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Presentations<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4dfbe85 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4dfbe85\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0b279c4\" data-id=\"0b279c4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44d3b9e elementor-widget elementor-widget-text-editor\" data-id=\"44d3b9e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\n<table id=\"tablepress-2\" class=\"tablepress tablepress-id-2\">\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-1\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\">invited paper at CICC 2019: M. Alioto, S. Taneja, \u201cEnabling Ubiquitous Hardware Security via Energy-Efficient Primitives and Systems,\u201d in Proc. of IEEE CICC 2019 (invited), Austin (USA), April 2019<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-2\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\">ITUS: A Secure RISC-V System-on-Chip<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\">Reconfigurable Routing Paths As Noise Generators Using NoC Platform for Hardware Security Applications&#8221;&#8221;, Ho Weng-Geng, Pammu Ali Akbar, Lwin Ne Kyaw Zwa, Chong Kwen-Siong, Gwee Bah-Hwee<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\">Batina, Lejla, Shivam Bhasin, Dirmanto Jap, and Stjepan Picek. &#8220;Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks.&#8221; In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2657-2659. 2019.<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\">Recruiting Fault Tolerance Techniques for Microprocessor Security<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\">Side-Channel-Attack Resistant Dual-Rail Asynchronous-Logic AES Accelerator Based on Standard Library Cells&#8221;&#8221;, Chong Kwen-Siong, Shreedhar Aparna, Lwin Ne Kyaw Zwa, Kyaw Nay Aung, Ho Weng-Geng, Wang Chao, Zhou Jun, Gwee Bah-Hwee, Chang Joseph S.<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">7<\/td><td class=\"column-2\">Vinay BY Kumar, Suman D, Rupesh K, Mustafa K, Anupam Chattopadhyay, Avi Mendelson: \u201cRecruiting Fault Tolerance Techniques for Microprocessor Security\u201d, 28th IEEE Asian Test Symposium (ATS), 2019, Kolkata<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">8<\/td><td class=\"column-2\">Security in the Post-Quantum Era: Threats and Countermeasures &#8211;  Beyond Post-Quantum Security<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">9<\/td><td class=\"column-2\">Vinay BY Kumar, Naina Gupta, Anupam Chattopadhyay, Michael Kasper, Christoph Krauss and Ruben Niederhagen: \u201cPost-Quantum Secure Boot\u201d, Design, Automation and Test in Europe Conference (DATE), 2020, Grenoble<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">10<\/td><td class=\"column-2\">Bhasin, Shivam, Trevor E. Carlson, Anupam Chattopadhyay, Vinay BY Kumar, Avi Mendelson, Romain Poussier, and Yaswanth Tavva. &#8220;Secure Your SoC: Building System-on-Chip Designs for Security.&#8221; Published at IEEE SOCC 2020<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">11<\/td><td class=\"column-2\">S. Taneja, M. Alioto, \u201cDeep Sub-pJ\/bit Low-Area Energy-Security Scalable SIMON Crypto-Core,\u201d accepted to IEEE ISCAS 2020, Seville (Spain), Oct 2020<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">12<\/td><td class=\"column-2\">A Highly Efficient Power Model for Correlation Power Analysis (CPA) of Pipelined Advanced Encryption Standard (AES)&#8221;&#8221;, Ng Jun-Sheng, Chen Juncheng, Kyaw Nay Aung, Lwin Ne Kyaw Zwa, Ho Weng-Geng, Chong Kwen-Siong, Gwee Bah-Hwee<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">13<\/td><td class=\"column-2\">A DPA-Resistant Asynchronous-Logic NoC Router with Dual-Supply-Voltage-Scaling for Multicore Cryptographic Applications&#8221;&#8221;, Ho Weng-Geng, Lwin Ne Kyaw Zwa, Kyaw Nay Aung, Ng Jun-Sheng, Chen Juncheng, Chong Kwen-Siong, Gwee Bah-Hwee,<br \/>\nChang, Joseph S<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">14<\/td><td class=\"column-2\">Jap, Dirmanto, and Shivam Bhasin. &#8220;Practical Reverse Engineering of Secret Sboxes by Side-Channel Analysis.&#8221; In 2020 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1-5. IEEE, 2020. <br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">15<\/td><td class=\"column-2\">High Throughput and Secure Authentication-Encryption on Asynchronous Multicore Processor for Edge Computing IoT Applications&#8221;&#8221;, Ho Weng-Geng, Pammu Ali Akbar, Lwin Ne Kyaw Zwa, Chong Kwen-Siong, Gwee Bah-Hwee<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">16<\/td><td class=\"column-2\">S. Taneja, M. Alioto, &#8220;&#8221;Fully-Synthesizable All-Digital Unified Dynamic Entropy Generation, Extraction and Utilization in a Cryptographic Core for Constrained Secure Systems,&#8221;&#8221; ASSC 2020<br \/>\n<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">17<\/td><td class=\"column-2\">Laser Attack Benchmark Suite<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-18\">\n\t<td class=\"column-1\">18<\/td><td class=\"column-2\">High Efficiency Early-Complete Brute Force Elimination Method for Security Analysis of Camouflage IC<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-19\">\n\t<td class=\"column-1\">19<\/td><td class=\"column-2\">Azouaoui, Melissa, Fran\u00e7ois Durvaux, Romain Poussier, Fran\u00e7ois-Xavier Standaert, Kostas Papagiannopoulos, and Vincent Verneuil. &#8220;On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices.&#8221; In International Conference on Cryptology in India, pp. 205-227. Springer, Cham, 2020<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-20\">\n\t<td class=\"column-1\">20<\/td><td class=\"column-2\">Ravi, Prasanna, Romain Poussier, Shivam Bhasin, and Anupam Chattopadhyay. &#8220;On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT.&#8221; In International Conference on Security, Privacy, and Applied Cryptography Engineering, pp. 123-146. Springer, Cham, 2020.<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-21\">\n\t<td class=\"column-1\">21<\/td><td class=\"column-2\">S. Taneja, V. Konandur, M. Alioto, \u201cUnified In-Memory Dynamic (TRNG) and Multi-Bit Static (PUF) Entropy Generation for Ubiquitous Hardware Security,\u201d accepted to ISSCC 2021<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-22\">\n\t<td class=\"column-1\">22<\/td><td class=\"column-2\">Hou, Xiaolu, Jakub Breier, and Shivam Bhasin. &#8220;DNFA: Differential no-fault analysis of bit permutation based ciphers assisted by side-channel.&#8221; In 2021 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE), pp. 182-187. IEEE, 2021 <br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-23\">\n\t<td class=\"column-1\">23<\/td><td class=\"column-2\">Normalized Differential Power Analysis &#8211; A Ghost Peak Suppressing Differential Power Analysis<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-24\">\n\t<td class=\"column-1\">24<\/td><td class=\"column-2\">Q. Fang, M. Alioto, \u201cLast-round and Joint First\/Last-Round Power Analysis Attacks on PRESENT,\u201d accepted to IEEE AsianHOST 2021<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-25\">\n\t<td class=\"column-1\">25<\/td><td class=\"column-2\">Q. Fang, L. Lin, Y. Z. Wong, H. Zhang, M. Alioto, \u201cSide-Channel Attack Counteraction via Machine Learning Targeted Power Compensation for Post-Silicon HW Security Patching,\u201d accepted to ISSCC 2022<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-26\">\n\t<td class=\"column-1\">26<\/td><td class=\"column-2\">Sentry-NoC: A Statically Scheduled NoC for Secure SoCs<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-27\">\n\t<td class=\"column-1\">27<\/td><td class=\"column-2\">Saha, Sayandeep, et al. &#8220;Divided We Stand, United We Fall: Security Analysis of Some SCA+ SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks.&#8221; To Appear in Asiacrypt 2021.<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-28\">\n\t<td class=\"column-1\">28<\/td><td class=\"column-2\">On Threat of Hardware Trojan to Post-Quantum Lattice-Based Schemes: A Key Recovery Attack on SABER and Beyond<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-29\">\n\t<td class=\"column-1\">29<\/td><td class=\"column-2\">Robustness Against Adversarial Attacks using Dimensionality<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-30\">\n\t<td class=\"column-1\">30<\/td><td class=\"column-2\">ROWBACK: Robust Watermarking for neural networks using BACKdoors<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-31\">\n\t<td class=\"column-1\">31<\/td><td class=\"column-2\">V. Konandur, H. Raghav, T. Wang, M. Alioto, \u201cFully-Digital Broadband Calibration-Less Impedance Monitor for Probe Insertion Detection against Power Analysis Attacks,\u201d in Proc. of VLSI Symposium 2022, Honolulu (USA), June 2022, pp. 140-141<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-32\">\n\t<td class=\"column-1\">32<\/td><td class=\"column-2\">Non-profiling Based Correlation Optimization Deep Learning Analysis<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-33\">\n\t<td class=\"column-1\">33<\/td><td class=\"column-2\">An Asynchronous-Logic Masked Advanced Encryption Standard (AES) Accelerator and its Side-Channel Attack Evaluations   <br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-34\">\n\t<td class=\"column-1\">34<\/td><td class=\"column-2\">H. Zhang, L. Lin, Q. Fang, M. Alioto, \u201cOn-Chip Laser Voltage Probing Attack Detection with 100% Area Coverage at Above\/Below the Bandgap Wavelength and Fully-Automated Design,\u201d in Proc. of VLSI Symposium 2022, Honolulu (USA), June 2022, pp. 144-145<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-35\">\n\t<td class=\"column-1\">35<\/td><td class=\"column-2\">ROFL: RObust privacy preserving Federated Learning<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-36\">\n\t<td class=\"column-1\">36<\/td><td class=\"column-2\">Elasticlave: An Efficient Memory Model for Enclaves<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-37\">\n\t<td class=\"column-1\">37<\/td><td class=\"column-2\">Fast, Robust and Accurate Detection of Cache-based Spectre Attack Phases<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-38\">\n\t<td class=\"column-1\">38<\/td><td class=\"column-2\">Khairallah, Mustafa, and Shivam Bhasin. &#8220;Hardware Implementation of Masked SKINNY SBox with Application to AEAD.&#8221; In\u00a0Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, SPACE 2022, Jaipur, India, December 9\u201312, 2022, Proceedings, pp. 50-69. Cham: Springer Nature Switzerland, 2022.<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-39\">\n\t<td class=\"column-1\">39<\/td><td class=\"column-2\">Incremental Linear Regression Attack<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-40\">\n\t<td class=\"column-1\">40<\/td><td class=\"column-2\">Leaking Control Flow Information via the Hardware Prefetcher <br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-41\">\n\t<td class=\"column-1\">41<\/td><td class=\"column-2\"> A Next-Generation Side-Channel Detector for General-Purpose Processors<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-42\">\n\t<td class=\"column-1\">42<\/td><td class=\"column-2\">A Privacy-Preserving Protocol Level Approach to Prevent Machine Learning Modelling Attacks on PUFs in the Presence of Semi-Honest Verifiers<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-43\">\n\t<td class=\"column-1\">43<\/td><td class=\"column-2\">J. Basu, Sachin Taneja, V. Konandur Rajanna, T. Wang, M. Alioto, \u201cECC-Less Multi-Level SRAM Physically Unclonable Function and 127% PUF-to-Memory Capacity Ratio with No Bitcell Modification in 28nm,\u201d in Proc. of VLSI Symposium 2023, Kyoto (Japan), June 2023<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-44\">\n\t<td class=\"column-1\">44<\/td><td class=\"column-2\">H. Zhang, L. Lin, Q. Fang, U. S. H. Kalingage, M. Alioto, \u201cSelf-Referenced Design-Agnostic Laser Voltage Probing Attack Detection with 100% Protection Coverage, 58% Area Overhead for Automated Design,\u201d in Proc. of VLSI Symposium 2023, Kyoto (Japan), June 2023<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-45\">\n\t<td class=\"column-1\">45<\/td><td class=\"column-2\">Q. Fang, L. Lin, H. Zhang, T. Wang, M. Alioto, \u201cVoltage Scaling-Agnostic Counteraction of Side-Channel Neural Net Reverse Engineering via Machine Learning Compensation and Multi-Level Shuffling,\u201d in Proc. of VLSI Symposium 2023, Kyoto (Japan), June 2023<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-46\">\n\t<td class=\"column-1\">46<\/td><td class=\"column-2\">Saha, S., Ravi, P., Jap, D., &amp; Bhasin, S. (2023, April). Non-Profiled Side-Channel Assisted Fault Attack: A Case Study on DOMREP. In\u00a02023 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)\u00a0(pp. 1-6). IEEE.<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-47\">\n\t<td class=\"column-1\">47<\/td><td class=\"column-2\">Beegala, P., Roy, D. B., Ravi, P., Bhasin, S., Chattopadhyay, A., &amp; Mukhopadhyay, D. (2022, October). Efficient Loop Abort Fault Attacks on Supersingular Isogeny based Key Exchange (SIKE). In\u00a02022 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)(pp. 1-6). IEEE.<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-48\">\n\t<td class=\"column-1\">48<\/td><td class=\"column-2\">A RISC-V SoC with Hardware Trojans: Case Study on Trojan-ing the On-Chip Protocol Conversion<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-49\">\n\t<td class=\"column-1\">49<\/td><td class=\"column-2\">CRYSTALS-Dilithium on RISC-V Processor: Lightweight Secure Boot Using Post-Quantum Digital Signature<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-50\">\n\t<td class=\"column-1\">50<\/td><td class=\"column-2\">Improving FPGA-based Async-logic AES Accelerator with the Integration of Sync-logic Block RAMs<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-51\">\n\t<td class=\"column-1\">51<\/td><td class=\"column-2\">A Residual-Remainder Coupled Unlimited Sampling Framework for High Dynamic Range Signal Conversion<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-52\">\n\t<td class=\"column-1\">52<\/td><td class=\"column-2\">Non-profiling Time-Frequency Analysis based Correlation Optimization with Deep Learning<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-53\">\n\t<td class=\"column-1\">53<\/td><td class=\"column-2\">A Novel Non-profiling Side-Channel Attack on Masked Devices with Connectivity Matrix<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-54\">\n\t<td class=\"column-1\">54<\/td><td class=\"column-2\">Y. Chen, A. Hajiabadi, and T. E. Carlson, &#8220;GadgetSpinner: A New Transient Execution Primitive using the Loop Stream Detector,&#8221; International Symposium on High-Performance Computer Architecture (HPCA), 2024.<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-55\">\n\t<td class=\"column-1\">55<\/td><td class=\"column-2\">B. Amornpaisannon, A. Diavastos, L. -S. Peh and T. E. Carlson, &#8220;Secure Run-Time Hardware Trojan Detection Using Lightweight Analytical Models,&#8221; in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 43, no. 2, pp. 431-441, Feb. 2024, doi: 10.1109\/TCAD.2023.3316113<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-56\">\n\t<td class=\"column-1\">56<\/td><td class=\"column-2\">A. Pashrashid, A. Hajiabadi, and T. E. Carlson, &#8220;HidFix: Efficient Mitigation of Cache-based Spectre Attacks Through Hidden Rollbacks,&#8221; International Conference on Computer-Aided Design (ICCAD), 2023.<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-57\">\n\t<td class=\"column-1\">57<\/td><td class=\"column-2\">Y. Chen, L. Pei, and T. E. Carlson, &#8220;AfterImage: Leaking Control Flow Data and Tracking Load Operations via the Hardware Prefetcher,&#8221; International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2023<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-58\">\n\t<td class=\"column-1\">58<\/td><td class=\"column-2\">Ayanga Imesha Kumari Kalupahana, Ananta Narayanan Balaji, Xiaokui Xiao, and Li-Shiuan Peh. 2023. SeRaNDiP: Leveraging Inherent Sensor Random Noise for Differential Privacy Preservation in Wearable Community Sensing Applications. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7, 2, Article 61 (June 2023), 38 pages<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-59\">\n\t<td class=\"column-1\">59<\/td><td class=\"column-2\">SRAM PUF Extracting Entropy from Every Bitcell Transistor for 6 bit\/bitcell with Data Fingerprinting Capability and Native Cryptography-Grade Entropy<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-60\">\n\t<td class=\"column-1\">60<\/td><td class=\"column-2\">Y. Chen, A. Hajiabadi, L. Pei, and T. E. Carlson, &#8220;PrefetchX: Cross-Core Cache-Agnostic Prefetcher-Based Side-Channel Attacks&#8221;<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-61\">\n\t<td class=\"column-1\">61<\/td><td class=\"column-2\">Y. Chen, A. Pashrashid, Y. Wu, and T. E. Carlson, &#8220;Prime+Reset: Introducing A Novel Cross-World Covert-Channel Through Comprehensive Security Analysis on ARM TrustZone&#8221;<br \/>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-2 from cache -->\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-207dad9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"207dad9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7b9143a\" data-id=\"7b9143a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca778dc elementor-widget elementor-widget-spacer\" data-id=\"ca778dc\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-10c9b5a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"10c9b5a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-67bb077\" data-id=\"67bb077\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d05665c elementor-widget elementor-widget-heading\" data-id=\"d05665c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Demos and public materials<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5b58fe4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5b58fe4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-60ea00d\" data-id=\"60ea00d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-05629f2 elementor-widget elementor-widget-text-editor\" data-id=\"05629f2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>PUFdb: <a href=\"http:\/\/www.green-ic.org\/physically-unclonable-function-database-pufdb\/\">http:\/\/www.green-ic.org\/pufdb<\/a><br \/>HWsecdb: <a href=\"http:\/\/www.green-ic.org\/hardware-security-database-hwsecdb\/\">http:\/\/www.green-ic.org\/hwsecdb<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a58020a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a58020a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0d85eed\" data-id=\"0d85eed\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2e4cddf elementor-widget elementor-widget-spacer\" data-id=\"2e4cddf\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-55bb3b4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"55bb3b4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9cdfafc\" data-id=\"9cdfafc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff81cf0 elementor-widget elementor-widget-heading\" data-id=\"ff81cf0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Talks<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b2e354c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b2e354c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ab6759c\" data-id=\"ab6759c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe741f6 elementor-widget elementor-widget-text-editor\" data-id=\"fe741f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\n<table id=\"tablepress-3\" class=\"tablepress tablepress-id-3\">\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-1\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\"><a href=\"http:\/\/Ubiquitous Always-On Hardware Security: Trends, Perspectives and Directions \u2013 keynote speech at the COSADE 2020 workshop, April 3, 2020, Lugano (Switzerland)\" rel=\"noopener\" target=\"_blank\"> Ubiquitous Always-On Hardware Security: Trends, Perspectives and Directions \u2013 keynote speech at the COSADE 2020 workshop, April 3, 2020, Lugano (Switzerland)<\/a><\/td>\n<\/tr>\n<tr class=\"row-2\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\"><a href=\"http:\/\/Towards Pervasive Hardware Security \u2013 Across and Within Silicon Chips \u2013 keynote speech at the IEEE AsianHOST conference, Dec 16-17, 2019, Xi\u2019an (China)\" rel=\"noopener\" target=\"_blank\"> Towards Pervasive Hardware Security \u2013 Across and Within Silicon Chips \u2013 keynote speech at the IEEE AsianHOST conference, Dec 16-17, 2019, Xi\u2019an (China)<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\"><a href=\"http:\/\/Ubiquitous Always-On Hardware Security: Trends, Perspectives and Directions - keynote speech at the IEEE IVSW 2019 conference, July 2, 2019 Rhodes (Greece)\" rel=\"noopener\" target=\"_blank\"> Ubiquitous Always-On Hardware Security: Trends, Perspectives and Directions &#8211; keynote speech at the IEEE IVSW 2019 conference, July 2, 2019 Rhodes (Greece)<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\"><a href=\"http:\/\/Can Secure architecture perform? - Talk at Campus of the Universitat Polit\u00e8cnica de Catalunya (Spain)\" rel=\"noopener\" target=\"_blank\"> Can Secure architecture perform? &#8211; Talk at Campus of the Universitat Polit\u00e8cnica de Catalunya (Spain)<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\"><a href=\"http:\/\/Hardware Security in Energy-Constrained Silicon Chips: from Principles to State of the Art \u2013 tutorial at IEEE ISCAS, May 19, 2019, Sapporo (Japan)\" rel=\"noopener\" target=\"_blank\"> Hardware Security in Energy-Constrained Silicon Chips: from Principles to State of the Art \u2013 tutorial at IEEE ISCAS, May 19, 2019, Sapporo (Japan)<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\"><a href=\"http:\/\/Hardware security \u2013 from Basics to ASICs \u2013 tutorial at ISSCC 2019, San Francisco (USA), Feb 17, 2019\" rel=\"noopener\" target=\"_blank\">Hardware security \u2013 from Basics to ASICs \u2013 tutorial at ISSCC 2019, San Francisco (USA), Feb 17, 2019<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">7<\/td><td class=\"column-2\"><a href=\"http:\/\/Technologies for built-in hardware security \u2013 short course at EDTM 2019, March 12, 2019, Marina Bay Sands (Singapore)\" rel=\"noopener\" target=\"_blank\">Technologies for built-in hardware security \u2013 short course at EDTM 2019, March 12, 2019, Marina Bay Sands (Singapore)<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">8<\/td><td class=\"column-2\"><a href=\"http:\/\/Recruiting Fault Tolerance Techniques for Microprocessor Security\" rel=\"noopener\" target=\"_blank\">Recruiting Fault Tolerance Techniques for Microprocessor Security<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">9<\/td><td class=\"column-2\"><a href=\"http:\/\/Post-Quantum Secure Boot\" rel=\"noopener\" target=\"_blank\">Post-Quantum Secure Boot<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">10<\/td><td class=\"column-2\"><a href=\"http:\/\/Building Blocks of a Secure SoC\" rel=\"noopener\" target=\"_blank\">Building Blocks of a Secure SoC<\/a><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">11<\/td><td class=\"column-2\"><a href=\"http:\/\/SoCure Project - 9th International Conference on Security, Privacy and Applied Cryptographic Engineering\" rel=\"noopener\" target=\"_blank\">SoCure Project &#8211; 9th International Conference on Security, Privacy and Applied Cryptographic Engineering<\/a><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">12<\/td><td class=\"column-2\"><a href=\"http:\/\/SoCure Project - Week of Open Source Hardware (WOSH), Zurich, Switzerland\" rel=\"noopener\" target=\"_blank\"> SoCure Project &#8211; Week of Open Source Hardware (WOSH), Zurich, Switzerland<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-3 from cache -->\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Videos https:\/\/www.youtube.com\/watch?v=MORtmDNfRDUhttps:\/\/www.youtube.com\/watch?v=_cBzb4uguQM https:\/\/www.youtube.com\/watch?v=WPEKcT9sm1khttps:\/\/www.youtube.com\/watch?v=VmC2-QbcL88 https:\/\/www.youtube.com\/watch?v=T5OGc-PlbSQhttps:\/\/www.youtube.com\/watch?v=-55Wt_PrNIMhttps:\/\/www.youtube.com\/watch?v=76bv45FVLIs Publications Presentations Demos and public materials PUFdb: http:\/\/www.green-ic.org\/pufdbHWsecdb: http:\/\/www.green-ic.org\/hwsecdb Talks<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"ub_ctt_via":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-329","page","type-page","status-publish","hentry"],"featured_image_src":null,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/green-ic.org\/SOCure\/wp-json\/wp\/v2\/pages\/329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/green-ic.org\/SOCure\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/green-ic.org\/SOCure\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/green-ic.org\/SOCure\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/green-ic.org\/SOCure\/wp-json\/wp\/v2\/comments?post=329"}],"version-history":[{"count":5,"href":"https:\/\/green-ic.org\/SOCure\/wp-json\/wp\/v2\/pages\/329\/revisions"}],"predecessor-version":[{"id":593,"href":"https:\/\/green-ic.org\/SOCure\/wp-json\/wp\/v2\/pages\/329\/revisions\/593"}],"wp:attachment":[{"href":"https:\/\/green-ic.org\/SOCure\/wp-json\/wp\/v2\/media?parent=329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}