readings
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
readings [2020/11/12 15:21] – [Lecture 7.b (29.10 Thu.)] yaglikca | readings [2020/12/11 08:37] (current) – alserm | ||
---|---|---|---|
Line 47: | Line 47: | ||
===== Lecture 6.b (22.10 Thu.) ===== | ===== Lecture 6.b (22.10 Thu.) ===== | ||
=== Suggested (lecture 6.b): === | === Suggested (lecture 6.b): === | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{http:// | ||
===== Lecture 7.a (29.10 Thu.) ===== | ===== Lecture 7.a (29.10 Thu.) ===== | ||
=== Suggested (lecture 7.a): === | === Suggested (lecture 7.a): === | ||
Line 58: | Line 60: | ||
- | ===== Session 5.2 (12.11 Thu.) ===== | + | ===== Lecture 9 (12.11 Thu.) ===== |
- | === Suggested (session 5.2): === | + | === Suggested (lecture 9.a): === |
+ | * {{http:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | |||
+ | === Suggested (lecture 9.b): === | ||
* {{https:// | * {{https:// | ||
- | * {{https:// | + | * {{barenghi2018softwareonly.pdf|A. Barenghiet al., “Software-Only Reverse Engineering of Physical DRAM Mappings for RowHammer Attacks,” inIVSW, 2018}} |
* {{https:// | * {{https:// | ||
* {{https:// | * {{https:// | ||
USA, 2015}} | USA, 2015}} | ||
* {{http:// | * {{http:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{khan2018analysis.pdf|Mohammad Khan and Swaroop Ghosh. " | ||
+ | |||
+ | ===== Lecture 10 (19.11 Thu.) ===== | ||
+ | === Suggested (lecture 10.a): === | ||
+ | * {{dpuf_sutar.pdf|S. Sutar, A. Raha, D. Kulkarni, R. Shorey, J. Tew, and V. Raghunathan, | ||
+ | * {{deterministic_encryption.pdf|M. Bellare, R. Dowsley, and S. Keelveedhi, "How Secure is Deterministic Encryption?" | ||
+ | * {{tehranipoor_robust_TRNG.pdf|F. Tehranipoor, | ||
+ | * {{keller_trng.pdf|C. Keller, F. Gurkaynak, H. Kaeslin, and N. Felber, “Dynamic Memory-based | ||
+ | Physically Unclonable Function for the Generation of Unique Identifiers and | ||
+ | True Random Numbers,” ISCAS, 2014.}} | ||
+ | |||
+ | === Suggested (lecture 10.b): === | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{dac19-aligns.pdf|S. Angizi, J. Sun, W. Zhang, D. Fan, " | ||
+ | * {{isca19-duality.pdf|D. Fujiki, S. Mahlke, R. Das, " | ||
+ | * {{https:// | ||
+ | * {{micro17-drisa.pdf| S. Li, D. Niu, K.T. Malladi, H. Zheng, B. Brennan, Y. Xie, " | ||
+ | * {{dac18-dracc.pdf| Q. Deng, L. Jiang, Y. Zhang, M. Zhang, J. Yang, " | ||
+ | |||
+ | |||
+ | ===== Lecture 12 (03.12 Thu.) ===== | ||
+ | === Suggested (lecture 12.a): === | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | USA, 2015}} | ||
+ | * {{https:// | ||
+ | |||
+ | === Suggested (lecture 12.b): === | ||
+ | * {{ https:// | ||
+ | * {{ liu2013.pdf | Yu Liu, Yier Jin and Yiorgos Makris. " | ||
+ | * {{ trippel2020.pdf | Trippel, T., Shin, K.G., Bush, K.B. and Hicks, M., 2020, May. "ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans", | ||
+ | * {{ https:// | ||
+ | |||
+ | |||
+ | ===== Lecture 13 (10.12 Thu.) ===== | ||
+ | === Suggested (lecture 13.a): === | ||
+ | * {{ https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | Bioinformatics, | ||
+ | * {{ https:// | ||
+ | IEEE Micro (IEEE MICRO), Vol. 40, No. 5, pages 65-75, September/ | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | " | ||
+ | BMC Genomics, 2018.}} | ||
+ | |||
+ |
readings.1605194519.txt.gz · Last modified: 2020/11/12 15:21 by yaglikca