Graphene and beyond: recent advances in two-dimensional materials synthesis, properties, and devices

Y Lei, T Zhang, YC Lin, T Granzier-Nakajima… - ACS Nanoscience …, 2022 - ACS Publications
Since the isolation of graphene in 2004, two-dimensional (2D) materials research has
rapidly evolved into an entire subdiscipline in the physical sciences with a wide range of …

A survey on physical unclonable function (PUF)-based security solutions for Internet of Things

A Shamsoshoara, A Korenda, F Afghah, S Zeadally - Computer Networks, 2020 - Elsevier
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …

Hardware trojans: Lessons learned after one decade of research

K Xiao, D Forte, Y Jin, R Karri, S Bhunia… - ACM Transactions on …, 2016 - dl.acm.org
Given the increasing complexity of modern electronics and the cost of fabrication, entities
from around the globe have become more heavily involved in all phases of the electronics …

A primer on hardware security: Models, methods, and metrics

M Rostami, F Koushanfar, R Karri - Proceedings of the IEEE, 2014 - ieeexplore.ieee.org
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …

A2: Analog malicious hardware

K Yang, M Hicks, Q Dong, T Austin… - 2016 IEEE symposium …, 2016 - ieeexplore.ieee.org
While the move to smaller transistors has been a boon for performance it has dramatically
increased the cost to fabricate chips using those smaller transistors. This forces the vast …

Secure scan and test using obfuscation throughout supply chain

X Wang, D Zhang, M He, D Su… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Scan-based test is commonly used to increase testability and fault coverage, however, it is
also known to be a liability for chip security. Research has shown that intellectual property …

Manipulating adversary's belief: A dynamic game approach to deception by design for proactive network security

K Horák, Q Zhu, B Bošanský - Decision and Game Theory for Security: 8th …, 2017 - Springer
Due to the sophisticated nature of current computer systems, traditional defense measures,
such as firewalls, malware scanners, and intrusion detection/prevention systems, have been …

Fort-NoCs: Mitigating the threat of a compromised NoC

DM Ancajas, K Chakraborty, S Roy - Proceedings of the 51st Annual …, 2014 - dl.acm.org
In this paper, we uncover a novel and imminent threat to an emerging computing paradigm:
MPSoCs built with 3rd party IP NoCs. We demonstrate that a compromised NoC (C-NoC) …

Building trusted ICs using split fabrication

K Vaidyanathan, BP Das, E Sumbul… - … on hardware-oriented …, 2014 - ieeexplore.ieee.org
Due to escalating manufacturing costs the latest and most advanced semiconductor
technologies are often available at off-shore foundries. Utilizing these facilities significantly …

HW2VEC: A graph learning tool for automating hardware security

SY Yu, R Yasaei, Q Zhou, T Nguyen… - … Oriented Security and …, 2021 - ieeexplore.ieee.org
The time-to-market pressure and continuous growing complexity of hardware designs have
promoted the globalization of the Integrated Circuit (IC) supply chain. However, such …