Research Directions for Verifiable Crypto-Physically Secure TEEs
S Bellemare - arXiv preprint arXiv:2410.03183, 2024 - arxiv.org
A niche corner of the Web3 world is increasingly making use of hardware-based Trusted
Execution Environments (TEEs) to build decentralized infrastructure. One of the motivations …
Execution Environments (TEEs) to build decentralized infrastructure. One of the motivations …
Trustworthy hardware design with logic locking
D Sisejkovic, R Leupers - … on Very Large Scale Integration (VLSI …, 2021 - ieeexplore.ieee.org
As the designated root of trust, hardware is undoubtedly the most critical layer to security in
modern electronic systems. Protecting its integrity throughout the integrated circuit supply …
modern electronic systems. Protecting its integrity throughout the integrated circuit supply …
Lockit: A Logic Locking Automation Software
N Kajtez, Y Zhang, B Halak - Electronics, 2021 - mdpi.com
The significant rise in the cost of manufacturing nanoscale integrated circuits (ICs) has led
the majority of IC design companies to outsource the fabrication of their products to other …
the majority of IC design companies to outsource the fabrication of their products to other …
Security Metrics: One Problem, Many Dimensions
D Sisejkovic, R Leupers - Logic Locking: A Practical Approach to Secure …, 2022 - Springer
Despite the great efforts invested in designing resilient schemes, the versatile security
properties of logic locking make it notoriously difficult to define usable and comprehensive …
properties of logic locking make it notoriously difficult to define usable and comprehensive …
Protecting the integrity of processor cores with logic encryption
D Ŝiŝejković, F Merchant… - 2019 32nd IEEE …, 2019 - ieeexplore.ieee.org
Malicious circuit modifications known as hardware Trojans represent a rising threat to the
integrated circuit supply chain. Logic encryption has emerged as a prominent technique for …
integrated circuit supply chain. Logic encryption has emerged as a prominent technique for …
Sicherheitsmetriken: Ein Problem, viele Dimensionen
D Sisejkovic, R Leupers - Logic Locking: Ein praktischer Ansatz für sichere …, 2024 - Springer
Trotz der großen Anstrengungen, die in die Gestaltung widerstandsfähiger Schemata
investiert wurden, machen die vielseitigen Sicherheitseigenschaften des Logic Lockings es …
investiert wurden, machen die vielseitigen Sicherheitseigenschaften des Logic Lockings es …
Logic Locking
D Sisejkovic, R Leupers - Springer
A subtle change that leads to disastrous consequences—hardware Trojans undoubtedly
pose one of the greatest security threats to the modern age. How to protect hardware against …
pose one of the greatest security threats to the modern age. How to protect hardware against …
[PDF][PDF] Designing trustworthy hardware with logic locking
D Šišejković - scholar.archive.org
From smartphones and laptops to automotive, medical, and defense applications,
microelectronic devices are deeply anchored in the modern way of life. This everincreasing …
microelectronic devices are deeply anchored in the modern way of life. This everincreasing …