|
|
PROOFS 2018: Author Index| Author | Papers |
|---|
| A | | Alam, Manaar | Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms | | Aoki, Takafumi | A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults | | B | | Balasch, Josep | Towards Efficient and Automated Side Channel Evaluations at Design Time | | G | | Gay, Maël | Detection and Correction of Malicious and Natural Faults in Cryptographic Modules | | Ghosh, Santosh | Towards Efficient and Automated Side Channel Evaluations at Design Time | | H | | Hamad, Mohammad | Attack-tree-based Threat Modeling of Medical Implants | | Homma, Naofumi | A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults | | I | | Ito, Akira | A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults | | K | | Kadiyala, Sai Praveen | Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms | | Karp, Batya | Detection and Correction of Malicious and Natural Faults in Cryptographic Modules | | Keren, Osnat | Detection and Correction of Malicious and Natural Faults in Cryptographic Modules | | L | | Lam, Siew Kei | Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms | | M | | Mukhopadhyay, Debdeep | Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms | | P | | Polian, Ilia | Detection and Correction of Malicious and Natural Faults in Cryptographic Modules | | Prevelakis, Vassilis | Attack-tree-based Threat Modeling of Medical Implants | | S | | Seepers, Robert M. | Attack-tree-based Threat Modeling of Medical Implants | | Siddiqi, Muhammad Ali | Attack-tree-based Threat Modeling of Medical Implants | | Srikanthan, Thambipillai | Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms | | Strydis, Christos | Attack-tree-based Threat Modeling of Medical Implants | | U | | Ueno, Rei | A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults | | V | | Verbauwhede, Ingrid | Towards Efficient and Automated Side Channel Evaluations at Design Time | | Y | | Yang, Bohan | Towards Efficient and Automated Side Channel Evaluations at Design Time | | Š | | Šijačić, Danilo | Towards Efficient and Automated Side Channel Evaluations at Design Time |
|
|
|