Hardware trojans in chips: A survey for detection and prevention
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Beyond cache attacks: Exploiting the bus-based communication structure for powerful on-chip microarchitectural attacks
System-on-Chips (SoCs) are a key enabling technology for the Internet-of-Things (IoT), a
hyper-connected world where on-and inter-chip communication is ubiquitous. SoCs usually …
hyper-connected world where on-and inter-chip communication is ubiquitous. SoCs usually …
Virtual platform to analyze the security of a system on chip at microarchitectural level
The processors (CPUs) embedded in System on Chip (SoC) have to face recent attacks
taking advantage of vulnerabilities/features in their microarchitectures to retrieve secret …
taking advantage of vulnerabilities/features in their microarchitectures to retrieve secret …
Coherence Attacks and Countermeasures in Interposer-based Chiplet Systems
GA Chacon, C Williams, J Knechtel… - ACM Transactions on …, 2024 - dl.acm.org
Industry is moving towards large-scale hardware systems that bundle processor cores,
memories, accelerators, and so on. via 2.5 D integration. These components are fabricated …
memories, accelerators, and so on. via 2.5 D integration. These components are fabricated …
Hardware trojan threats to cache coherence in modern 2.5 D chiplet systems
GA Chacon, C Williams, J Knechtel… - IEEE Computer …, 2022 - ieeexplore.ieee.org
As industry moves toward chiplet-based designs, the insertion of hardware Trojans poses a
significant threat to the security of these systems. These systems rely heavily on cache …
significant threat to the security of these systems. These systems rely heavily on cache …
Design, threat analysis and countermeasures for cache replacement policy-affecting Hardware Trojans in the context of a many-core system
Hardware Trojans, which threaten system reliability and integrity, have emerged as a
security threat to the IC industry. Hardware manufacturers acquire ICs from unreliable third …
security threat to the IC industry. Hardware manufacturers acquire ICs from unreliable third …
Lightweight Multicast Authentication in NoC-based SoCs
H Weerasena, P Mishra - 2024 25th International Symposium …, 2024 - ieeexplore.ieee.org
Network-on-Chip (NoC) is responsible for managing communication in modern SoCs. The
ubiquity of NoC and its distributed nature across the chip has made it a focal point of attacks …
ubiquity of NoC and its distributed nature across the chip has made it a focal point of attacks …
Evaluation and detection of hardware Trojan for real-time many-core systems
Due to the growing complexities of Integrated Circuits (ICs) and the current trend of
Intellectual Property (IP) based hardware designs, the possible threats of Hardware Trojans …
Intellectual Property (IP) based hardware designs, the possible threats of Hardware Trojans …
Caching efficiency enhancement at wireless edges with concerns on user's quality of experience
F Li, KY Lam, L Wang, Z Na, X Liu… - … and Mobile Computing, 2018 - Wiley Online Library
Content caching is a promising approach to enhancing bandwidth utilization and minimizing
delivery delay for new‐generation Internet applications. The design of content caching is …
delivery delay for new‐generation Internet applications. The design of content caching is …
Performing cache timing attacks from the reconfigurable part of a heterogeneous SoC—An experimental study
L Bossuet, EM Benhani - Applied Sciences, 2021 - mdpi.com
Cache attacks are widespread on microprocessors and multi-processor system-on-chips but
have not yet spread to heterogeneous systems-on-chip such as SoC-FPGA that are found in …
have not yet spread to heterogeneous systems-on-chip such as SoC-FPGA that are found in …