Securing the Hardware System Stack

A Dhavlle - 2022 - search.proquest.com
Computing systems have come a long way concerning speed, performance, optimization,
and security. The state-of-the-art designs are deployed in the real world, targeting a variety …

[引用][C] 2023ECOSYSTEM FOR TRUSTWORTHY IT

D Sisejkovic, LM Reimann, M Malenko, R Leupers - 2023

BIC: Blind Identification Countermeasure for Malicious Thermal Sensor Attacks in Mobile SoCs

M Abdelrehim, A Patooghy… - … on Quality Electronic …, 2022 - ieeexplore.ieee.org
Mobile System-on-Chips (SoCs) heavily rely on dynamic thermal management (DTM)
methods in order to deal with their thermal and power density issues at runtime. The …

[HTML][HTML] On this page

LM Reimann, D Sisejkovic, R Leupers - vision.hipeac.net
Hardware constitutes the foundation of any computer system. Ensuring its integrity
throughout the entirety of the hardware supply chain poses a significant challenge in …

[图书][B] Architecting a One-to-Many Traffic-Aware and Secure Millimeter-Wave Wireless Network-in-Package Interconnect for Multichip Systems

MM Ahmed - 2021 - search.proquest.com
With the aggressive scaling of device geometries, the yield of complex Multi Core Single
Chip (MCSC) systems with many cores will decrease due to the higher probability of …

[PDF][PDF] Internal Cognitive Assurance Model for Autonomous Robotic Systems (ICAMARS)

V DILUOFFO - 2021 - digital.wpi.edu
As robots increase their capabilities and expand into different markets, the question of
security needs to be addressed. One of the first papers related to robotics, security, and …

Boosting the Bounds of Symbolic QED for Effective Pre-Silicon Verification of Processor Cores

K Ganesan, SS Nuthakki - arXiv preprint arXiv:1908.06757, 2019 - arxiv.org
Existing techniques to ensure functional correctness and hardware trust during pre-silicon
verification face severe limitations. In this work, we systematically leverage two key ideas: 1) …