EETD: An energy efficient design for runtime hardware trojan detection in untrusted network-on-chip

M Hussain, A Malekpour, H Guo… - 2018 IEEE Computer …, 2018 - ieeexplore.ieee.org
Network-on-chip (NoC) is a communication intellectual property (IP) core, popularly used in
the system-on-a-chip (SoC) designs. The NoC IP core often comes from an untrusted 3rd …

Logic locking with provable security against power analysis attacks

A Sengupta, B Mazumdar, M Yasin… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Outsourcing of integrated circuit (IC) fabrication to external foundries has lead to many new
security vulnerabilities, including IC piracy, overbuilding, and reverse engineering. In this …

ESCALATION: Leveraging logic masking to facilitate path-delay-based hardware Trojan detection methods

A Nejat, D Hely, V Beroulle - Journal of Hardware and Systems Security, 2018 - Springer
Hardware Trojan (HT), intellectual property (IP) piracy, and overproduction of integrated
circuit (IC) are three threats that may happen in untrusted fabrication foundries. HTs are …

A bandwidth-aware authentication scheme for packet-integrity attack detection on Trojan infected NoC

M Hussain, H Guo - … IFIP/IEEE International Conference on Very …, 2018 - ieeexplore.ieee.org
Bandwidth is a fundamental issue in the NoC (Network on Chip) design and increasing use
of the third-party NoC IPs adds the security as another design concern. The third-party NoC …

High Level Transformation Techniques for Designing Reliable and Secure DSP Architectures

J Pathak, A Kumar, SL Tripathi - AI Techniques for Reliability …, 2020 - igi-global.com
Reverse engineering (RE) has become a serious threat to the silicon industry. To overcome
this threat, the ICs need to be made secure and non-obvious in order to find their …

НОВЫЕ СРЕДСТВА ОБЕСПЕЧЕНИЯ БЕЗОПАСНОСТИ ИНТЕЛЛЕКТУАЛЬНОЙ СОБСТВЕННОСТИ

АМХ Альбатша - ББК 3 П27, 2019 - elibrary.ru
За последние годы в результате глобализации и технологического развития
произошли существенные изменения в отношении специалистов по информационной …

[PDF][PDF] A Bandwidth-Aware Authentication Design for Packet Integrity Detection in Untrusted Third-party NoCs

M Hussain, H Guo - 2018 - cgi.cse.unsw.edu.au
Bandwidth is a fundamental issue in the network-on-chip (NoC) design and increasing use
of third-party NoC IPs adds the security as another design concern. The third-party NoC may …

АППАРАТНАЯ ОБФУСКАЦИЯ В ЗАДАЧАХ ЗАЩИТЫ ИНТЕЛЛЕКТУАЛЬНОЙ СОБСТВЕННОСТИ

АМХ Альбатша - Информационные технологии в науке, бизнесе и …, 2018 - elibrary.ru
В статье дается краткий обзор современных подходов к защите дизайна (средств
технического обеспечения) от различных угроз защите интеллектуальной …

Logic Encryption Methods for Hardware Security

S Sekar - 2017 - rave.ohiolink.edu
Integrated Circuit (IC) design flow has become a distributive model due to increase in the
cost of maintaining fabrication units as transistor technology is advancing. Design industries …