The RFET—A reconfigurable nanowire transistor and its application to novel electronic circuits and systems

T Mikolajick, A Heinzig, J Trommer… - Semiconductor …, 2017 - iopscience.iop.org
With CMOS scaling reaching physical limits in the next decade, new approaches are
required to enhance the functionality of electronic systems. Reconfigurability on the device …

Hardware trojans in chips: A survey for detection and prevention

C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen - Sensors, 2020 - mdpi.com
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …

Hardware trojans: Lessons learned after one decade of research

K Xiao, D Forte, Y Jin, R Karri, S Bhunia… - ACM Transactions on …, 2016 - dl.acm.org
Given the increasing complexity of modern electronics and the cost of fabrication, entities
from around the globe have become more heavily involved in all phases of the electronics …

Nano meets security: Exploring nanoelectronic devices for security applications

J Rajendran, R Karri, JB Wendt… - Proceedings of the …, 2015 - ieeexplore.ieee.org
Information security has emerged as an important system and application metric. Classical
security solutions use algorithmic mechanisms that address a small subset of emerging …

CamoPerturb: Secure IC camouflaging for minterm protection

M Yasin, B Mazumdar, O Sinanoglu… - 2016 IEEE/ACM …, 2016 - ieeexplore.ieee.org
Integrated circuit (IC) camouflaging is a layout-level technique that thwarts reverse
engineering attacks on ICs by introducing camouflaged cells that look alike, but can …

Emerging technology-based design of primitives for hardware security

Y Bi, K Shamsi, JS Yuan, PE Gaillardon… - ACM Journal on …, 2016 - dl.acm.org
Hardware security concerns such as intellectual property (IP) piracy and hardware Trojans
have triggered research into circuit protection and malicious logic detection from various …

Introduction to hardware security

Y Jin - Electronics, 2015 - mdpi.com
Hardware security has become a hot topic recently with more and more researchers from
related research domains joining this area. However, the understanding of hardware …

Germanium nanowire reconfigurable transistor model for predictive technology evaluation

JN Quijada, T Baldauf, S Rai, A Heinzig… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Reconfigurable Field Effect Transistors can be electrostatically programmed to p-or n-type
behavior. This device level reconfigurability is a promising way to enhance the functionality …

Connectedness oriented communication: Fostering a sense of connectedness to augment social relationships

K Kuwabara, T Watanabe, T Ohguro… - … 2002 symposium on …, 2002 - ieeexplore.ieee.org
This paper proposes a novel concept for network communication media, called"
connectedness oriented communication". While traditional network communication …

Using emerging technologies for hardware security beyond PUFs

A Chen, XS Hu, Y Jin, M Niemier… - 2016 Design, Automation …, 2016 - ieeexplore.ieee.org
We discuss how the unique I–V characteristics offered by emerging, post-CMOS transistors
can be used to enhance hardware security. Different from most existing work that exploits …