Graphene and beyond: recent advances in two-dimensional materials synthesis, properties, and devices
Since the isolation of graphene in 2004, two-dimensional (2D) materials research has
rapidly evolved into an entire subdiscipline in the physical sciences with a wide range of …
rapidly evolved into an entire subdiscipline in the physical sciences with a wide range of …
A survey on physical unclonable function (PUF)-based security solutions for Internet of Things
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …
and so on represent a thriving surface for several security attacks with economic …
Hardware trojans: Lessons learned after one decade of research
Given the increasing complexity of modern electronics and the cost of fabrication, entities
from around the globe have become more heavily involved in all phases of the electronics …
from around the globe have become more heavily involved in all phases of the electronics …
A primer on hardware security: Models, methods, and metrics
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …
A2: Analog malicious hardware
While the move to smaller transistors has been a boon for performance it has dramatically
increased the cost to fabricate chips using those smaller transistors. This forces the vast …
increased the cost to fabricate chips using those smaller transistors. This forces the vast …
Secure scan and test using obfuscation throughout supply chain
Scan-based test is commonly used to increase testability and fault coverage, however, it is
also known to be a liability for chip security. Research has shown that intellectual property …
also known to be a liability for chip security. Research has shown that intellectual property …
Manipulating adversary's belief: A dynamic game approach to deception by design for proactive network security
Due to the sophisticated nature of current computer systems, traditional defense measures,
such as firewalls, malware scanners, and intrusion detection/prevention systems, have been …
such as firewalls, malware scanners, and intrusion detection/prevention systems, have been …
Fort-NoCs: Mitigating the threat of a compromised NoC
In this paper, we uncover a novel and imminent threat to an emerging computing paradigm:
MPSoCs built with 3rd party IP NoCs. We demonstrate that a compromised NoC (C-NoC) …
MPSoCs built with 3rd party IP NoCs. We demonstrate that a compromised NoC (C-NoC) …
Building trusted ICs using split fabrication
Due to escalating manufacturing costs the latest and most advanced semiconductor
technologies are often available at off-shore foundries. Utilizing these facilities significantly …
technologies are often available at off-shore foundries. Utilizing these facilities significantly …
HW2VEC: A graph learning tool for automating hardware security
The time-to-market pressure and continuous growing complexity of hardware designs have
promoted the globalization of the Integrated Circuit (IC) supply chain. However, such …
promoted the globalization of the Integrated Circuit (IC) supply chain. However, such …