Hardware and information security primitives based on 2D materials and devices
Hardware security is a major concern for the entire semiconductor ecosystem that accounts
for billions of dollars in annual losses. Similarly, information security is a critical need for the …
for billions of dollars in annual losses. Similarly, information security is a critical need for the …
A survey of optimization techniques for thermal-aware 3D processors
Interconnect scaling has become a major design challenge for traditional planar (2D)
integrated circuits (ICs). Three-dimensional (3D) IC that stacks multiple device layers …
integrated circuits (ICs). Three-dimensional (3D) IC that stacks multiple device layers …
Covert channel communication as an emerging security threat in 2.5 d/3d integrated systems
In this paper, first, a broad overview of existing covert channel communication-based
security attacks is provided. Such covert channels establish a communication link between …
security attacks is provided. Such covert channels establish a communication link between …
Monolithic 3D Integrated circuits: Recent trends and future prospects
Monolithic 3D integration technology has emerged as an alternative candidate to
conventional transistor scaling. Unlike conventional processes where multiple metal layers …
conventional transistor scaling. Unlike conventional processes where multiple metal layers …
2.5 D root of trust: Secure system-level integration of untrusted chiplets
For the first time, we leverage the 2.5 D interposer technology to establish system-level
security in the face of hardware-and software-centric adversaries. More specifically, we …
security in the face of hardware-and software-centric adversaries. More specifically, we …
Mono3D: Open source cell library for monolithic 3-D integrated circuits
Monolithic 3-D (M3-D) integrated circuits (ICs) provide vertical interconnects with
comparable size to on-chip metal vias, and therefore, achieve ultra-high density device …
comparable size to on-chip metal vias, and therefore, achieve ultra-high density device …
A scan obfuscation guided design-for-security approach for sequential circuits
R Karmakar, S Chattopadhyay… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Logic locking, a popular countermeasure against IP piracy and counterfeiting, has been a
target of several attacks, especially Boolean satisfiability attacks. The state-of-the-art …
target of several attacks, especially Boolean satisfiability attacks. The state-of-the-art …
Hardware security for and beyond CMOS technology: an overview on fundamentals, applications, and challenges
J Knechtel - Proceedings of the 2020 International Symposium on …, 2020 - dl.acm.org
As with most aspects of electronic systems and integrated circuits, hardware security has
traditionally evolved around the dominant CMOS technology. However, with the rise of …
traditionally evolved around the dominant CMOS technology. However, with the rise of …
A modern approach to IP protection and trojan prevention: Split manufacturing for 3D ICs and obfuscation of vertical interconnects
S Patnaik, M Ashraf, O Sinanoglu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Split manufacturing (SM) and layout camouflaging (LC) are two promising techniques to
obscure integrated circuits (ICs) from malicious entities during and after manufacturing …
obscure integrated circuits (ICs) from malicious entities during and after manufacturing …
Hardware security for and beyond CMOS technology
J Knechtel - Proceedings of the 2021 International Symposium on …, 2021 - dl.acm.org
As with most aspects of electronic systems and integrated circuits, hardware security has
traditionally evolved around the dominant CMOS technology. However, with the rise of …
traditionally evolved around the dominant CMOS technology. However, with the rise of …