Securing the Hardware System Stack
A Dhavlle - 2022 - search.proquest.com
Computing systems have come a long way concerning speed, performance, optimization,
and security. The state-of-the-art designs are deployed in the real world, targeting a variety …
and security. The state-of-the-art designs are deployed in the real world, targeting a variety …
BIC: Blind Identification Countermeasure for Malicious Thermal Sensor Attacks in Mobile SoCs
M Abdelrehim, A Patooghy… - … on Quality Electronic …, 2022 - ieeexplore.ieee.org
Mobile System-on-Chips (SoCs) heavily rely on dynamic thermal management (DTM)
methods in order to deal with their thermal and power density issues at runtime. The …
methods in order to deal with their thermal and power density issues at runtime. The …
[HTML][HTML] On this page
Hardware constitutes the foundation of any computer system. Ensuring its integrity
throughout the entirety of the hardware supply chain poses a significant challenge in …
throughout the entirety of the hardware supply chain poses a significant challenge in …
[图书][B] Architecting a One-to-Many Traffic-Aware and Secure Millimeter-Wave Wireless Network-in-Package Interconnect for Multichip Systems
MM Ahmed - 2021 - search.proquest.com
With the aggressive scaling of device geometries, the yield of complex Multi Core Single
Chip (MCSC) systems with many cores will decrease due to the higher probability of …
Chip (MCSC) systems with many cores will decrease due to the higher probability of …
[PDF][PDF] Internal Cognitive Assurance Model for Autonomous Robotic Systems (ICAMARS)
V DILUOFFO - 2021 - digital.wpi.edu
As robots increase their capabilities and expand into different markets, the question of
security needs to be addressed. One of the first papers related to robotics, security, and …
security needs to be addressed. One of the first papers related to robotics, security, and …
Boosting the Bounds of Symbolic QED for Effective Pre-Silicon Verification of Processor Cores
K Ganesan, SS Nuthakki - arXiv preprint arXiv:1908.06757, 2019 - arxiv.org
Existing techniques to ensure functional correctness and hardware trust during pre-silicon
verification face severe limitations. In this work, we systematically leverage two key ideas: 1) …
verification face severe limitations. In this work, we systematically leverage two key ideas: 1) …