Published in: Dagstuhl Reports, Volume 9, Issue 7 (2020)
Divya Arora, Ilia Polian, Francesco Regazzoni, and Patrick Schaumont. Secure Composition for Hardware Systems (Dagstuhl Seminar 19301). In Dagstuhl Reports, Volume 9, Issue 7, pp. 94-116, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2019)
@Article{arora_et_al:DagRep.9.7.94, author = {Arora, Divya and Polian, Ilia and Regazzoni, Francesco and Schaumont, Patrick}, title = {{Secure Composition for Hardware Systems (Dagstuhl Seminar 19301)}}, pages = {94--116}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2019}, volume = {9}, number = {7}, editor = {Arora, Divya and Polian, Ilia and Regazzoni, Francesco and Schaumont, Patrick}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.9.7.94}, URN = {urn:nbn:de:0030-drops-116377}, doi = {10.4230/DagRep.9.7.94}, annote = {Keywords: Hardware, Secure composition, Security, Software} }
Published in: Dagstuhl Reports, Volume 6, Issue 5 (2016)
Osnat Keren, Ilia Polian, and Mark M. Tehranipoor. Hardware Security (Dagstuhl Seminar 16202). In Dagstuhl Reports, Volume 6, Issue 5, pp. 72-93, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2016)
@Article{keren_et_al:DagRep.6.5.72, author = {Keren, Osnat and Polian, Ilia and Tehranipoor, Mark M.}, title = {{Hardware Security (Dagstuhl Seminar 16202)}}, pages = {72--93}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2016}, volume = {6}, number = {5}, editor = {Keren, Osnat and Polian, Ilia and Tehranipoor, Mark M.}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.6.5.72}, URN = {urn:nbn:de:0030-drops-67218}, doi = {10.4230/DagRep.6.5.72}, annote = {Keywords: Hardware security; Passive and active side-channel analysis; Machine learning; Cryptographic blocks; True random number generators; Physically unclonable functions; Hardware Trojan} }
Published in: OASIcs, Volume 4, 6th International Workshop on Worst-Case Execution Time Analysis (WCET'06) (2006)
Jan Reineke, Björn Wachter, Stefan Thesing, Reinhard Wilhelm, Ilia Polian, Jochen Eisinger, and Bernd Becker. A Definition and Classification of Timing Anomalies. In 6th International Workshop on Worst-Case Execution Time Analysis (WCET'06). Open Access Series in Informatics (OASIcs), Volume 4, pp. 1-6, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{reineke_et_al:OASIcs.WCET.2006.671, author = {Reineke, Jan and Wachter, Bj\"{o}rn and Thesing, Stefan and Wilhelm, Reinhard and Polian, Ilia and Eisinger, Jochen and Becker, Bernd}, title = {{A Definition and Classification of Timing Anomalies}}, booktitle = {6th International Workshop on Worst-Case Execution Time Analysis (WCET'06)}, pages = {1--6}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-03-3}, ISSN = {2190-6807}, year = {2006}, volume = {4}, editor = {Mueller, Frank}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.WCET.2006.671}, URN = {urn:nbn:de:0030-drops-6713}, doi = {10.4230/OASIcs.WCET.2006.671}, annote = {Keywords: Timing analysis, Worst-case execution time, Timing anomalies, Scheduling Anomalies, Abstraction} }
Feedback for Dagstuhl Publishing