Poster Winners
![](http://fics.ece.ufl.edu/wp-content/uploads/IMG_4142-300x200-1.jpg)
Title: Building a Private Bitcoin-based Payment Network among Electric Vehicles and Charging Stations
Authors: Enes Erdin, Mumin Cebe, Kemal Akkaya, Senay Solak, Eyuphan Bulut, Selcuk Uluagac
![](http://fics.ece.ufl.edu/wp-content/uploads/xiaoyong-yuan2.jpg)
Title: Adversarial Voice Commands (AdVoice) in the Physical World:
Authors: Xiaoyong Yuan, Xiyao Ma, Ruimin Sun, Xiaolin Li
![](http://fics.ece.ufl.edu/wp-content/uploads/Joey-147x210-1.jpg)
Title: Automated Non-destructive PCB Reverse Engineering Using X-ray Tomography
Authors: Ulbert J. Botero, Navid Asadizanjani, Domenic Forte, Mark Tehranipoor
![](http://fics.ece.ufl.edu/wp-content/uploads/DSC_8049_preview-300x199-1.jpeg)
Title: Secure Integrated Circuit Design Hiding under Oracle-Guided Attacks
Authors: Kaveh Shamsi, Meng Li, Travis Meade, David Z. Pan, Yier Ji
![](http://fics.ece.ufl.edu/wp-content/uploads/Atul-210x210-1.png)
Title: “Patchable Hardware” for Future-proof Security Architecture
Authors: Atul Prasad Deb Nath, Sandeep Ray, Abhishek Basak, Swarup Bhunia
![](http://fics.ece.ufl.edu/wp-content/uploads/DSC01608_preview-300x200-1.jpeg)
Title: A Physical Design Flow against Front-side Probing Attacks by Internal Shielding
Authors: Huanyu Wang, Qihang Shi, Adib Nahiyan, Navid Asadi, Domenic Forte and Mark M. Tehranipoor
![](http://fics.ece.ufl.edu/wp-content/uploads/Logan-210x210-1.png)
Title: 2MA: Verifying Voice Commands via Two Microphone Authentication:
Authors: Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor
![](http://fics.ece.ufl.edu/wp-content/uploads/Muhammad_Sajidur_Rahman2-300x300-1.jpg)
Title: API Blindspots: Why Experienced Developers Write Vulnerable Code
Authors: Muhammad Sajidur Rahman, Tian Lin, Rad Akerad, Donovan Ellis, Eliany Perez, Lois Anne DeLong, Justin Cappos, Yuriy Brun, Natalie Ebner, Daniela Oliveira
Demo Winners
![](http://fics.ece.ufl.edu/wp-content/uploads/DSC_8113_preview-300x199-1.jpeg)
Title: SaINT: Sensitive Information Tracking for IoT Apps
Authors: Leonardo Babun, Z. Berkay Celik, Amit K. Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, and A. Selcuk Uluagac
![](http://fics.ece.ufl.edu/wp-content/uploads/DSC_8125_preview-300x199-1.jpeg)
Title: Golden Chip-Free Hardware Trojan Detection using Self-Referencing
Authors: Shuo Yang, Tamzidul Hoque, Swarup Bhunia
![](http://fics.ece.ufl.edu/wp-content/uploads/DSC_8101_preview-300x199-1.jpeg)
Title: A Framework for Hardware-assisted Malware Detection and Integrity Checking
Authors: Fahim Rahman, Nitin Pundir, Mohammad Farmani, Yier Jin, and Mark Tehrnaipoor
![](http://fics.ece.ufl.edu/wp-content/uploads/andrew-210x210-1.png)
Title: EM-based Fingerprinting Framework for Counterfeit Detection with Demonstration on Remarked ICs
Authors: Andrew Stern, Joey Botero, Bicky Shakya, Haoting Shen, Domenic Forte, and Mark Tehranipoor