Design of hardware trojans and its impact on cps systems: A comprehensive survey

A Dhavlle, R Hassan, M Mittapalli… - … on Circuits and …, 2021 - ieeexplore.ieee.org
The ever-increasing demand for sophisticated cyber-physical systems (CPS), combined with
the fabless model, led to vulnerability exploits in the IC supply chain, especially the insertion …

A novel algorithm for hardware trojan detection through reverse engineering

S Rajendran, ML Regeena - IEEE Transactions on Computer …, 2021 - ieeexplore.ieee.org
Malicious alteration in an IC design is generally referred to as hardware Trojans (HTs). The
involvement of multiple entities in the VLSI design cycle has made the process of HT …

AWARe-Wi: A jamming-aware reconfigurable wireless interconnection using adversarial learning for multichip systems

MM Ahmed, A Ganguly, A Vashist… - … : Informatics and Systems, 2021 - Elsevier
Performance of the compute-intensive multichip platforms such as micro-servers and
embedded systems are limited by the latency and power hungry chip-to-chip …

Securing on-chip communications: An on-the-fly encryption architecture for socs

A Sarihi, A Patooghy, M Hasanzadeh… - 2021 International …, 2021 - ieeexplore.ieee.org
This paper proposes an on-the-fly encryption system that consists of a lightweight encryption
architecture and a key-exchange algorithm for secure on-chip communications. The …

[HTML][HTML] A study on the relationship between usability of GUIS and power consumption of a PC: the case of phrs

JA García-Berná, S Ouhbi… - International Journal of …, 2021 - mdpi.com
Usability is key to achieve quality in software products. The client applications with a high
score in usability might impact on the power consumption when they are run in a PC. For this …

A Survey on Trust Metrics for Autonomous Robotic Systems

V DiLuoffo, WR Michalson - arXiv preprint arXiv:2106.15015, 2021 - arxiv.org
This paper surveys the area of Trust Metrics related to security for autonomous robotic
systems. As the robotics industry undergoes a transformation from programmed, task …

Independent Verification and Validation of Security-Aware EDA Tools and IP

B Tan, S Garg, R Karri, Y Liu, M Zuzak… - 2021 58th ACM/IEEE …, 2021 - ieeexplore.ieee.org
Secure silicon requires a seamless integration of new tools, new IP, and design flows to help
designers protect integrated circuits from increasingly sophisticated attacks. Independent …

[图书][B] Architecting a One-to-Many Traffic-Aware and Secure Millimeter-Wave Wireless Network-in-Package Interconnect for Multichip Systems

MM Ahmed - 2021 - search.proquest.com
With the aggressive scaling of device geometries, the yield of complex Multi Core Single
Chip (MCSC) systems with many cores will decrease due to the higher probability of …

[PDF][PDF] Internal Cognitive Assurance Model for Autonomous Robotic Systems (ICAMARS)

V DILUOFFO - 2021 - digital.wpi.edu
As robots increase their capabilities and expand into different markets, the question of
security needs to be addressed. One of the first papers related to robotics, security, and …