The RFET—A reconfigurable nanowire transistor and its application to novel electronic circuits and systems
With CMOS scaling reaching physical limits in the next decade, new approaches are
required to enhance the functionality of electronic systems. Reconfigurability on the device …
required to enhance the functionality of electronic systems. Reconfigurability on the device …
Hardware trojans in chips: A survey for detection and prevention
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Hardware trojans: Lessons learned after one decade of research
Given the increasing complexity of modern electronics and the cost of fabrication, entities
from around the globe have become more heavily involved in all phases of the electronics …
from around the globe have become more heavily involved in all phases of the electronics …
Nano meets security: Exploring nanoelectronic devices for security applications
Information security has emerged as an important system and application metric. Classical
security solutions use algorithmic mechanisms that address a small subset of emerging …
security solutions use algorithmic mechanisms that address a small subset of emerging …
CamoPerturb: Secure IC camouflaging for minterm protection
Integrated circuit (IC) camouflaging is a layout-level technique that thwarts reverse
engineering attacks on ICs by introducing camouflaged cells that look alike, but can …
engineering attacks on ICs by introducing camouflaged cells that look alike, but can …
Emerging technology-based design of primitives for hardware security
Hardware security concerns such as intellectual property (IP) piracy and hardware Trojans
have triggered research into circuit protection and malicious logic detection from various …
have triggered research into circuit protection and malicious logic detection from various …
Introduction to hardware security
Y Jin - Electronics, 2015 - mdpi.com
Hardware security has become a hot topic recently with more and more researchers from
related research domains joining this area. However, the understanding of hardware …
related research domains joining this area. However, the understanding of hardware …
Germanium nanowire reconfigurable transistor model for predictive technology evaluation
Reconfigurable Field Effect Transistors can be electrostatically programmed to p-or n-type
behavior. This device level reconfigurability is a promising way to enhance the functionality …
behavior. This device level reconfigurability is a promising way to enhance the functionality …
Connectedness oriented communication: Fostering a sense of connectedness to augment social relationships
K Kuwabara, T Watanabe, T Ohguro… - … 2002 symposium on …, 2002 - ieeexplore.ieee.org
This paper proposes a novel concept for network communication media, called"
connectedness oriented communication". While traditional network communication …
connectedness oriented communication". While traditional network communication …
Using emerging technologies for hardware security beyond PUFs
We discuss how the unique I–V characteristics offered by emerging, post-CMOS transistors
can be used to enhance hardware security. Different from most existing work that exploits …
can be used to enhance hardware security. Different from most existing work that exploits …