Conventional and machine learning approaches as countermeasures against hardware trojan attacks

KG Liakos, GK Georgakilas, S Moustakidis… - Microprocessors and …, 2020 - Elsevier
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …

[HTML][HTML] FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis

K Lata, LR Cenkeramaddi - Cryptography, 2023 - mdpi.com
Field-programmable gate arrays (FPGAs) have firmly established themselves as dynamic
platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic …

Secure scan and test using obfuscation throughout supply chain

X Wang, D Zhang, M He, D Su… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Scan-based test is commonly used to increase testability and fault coverage, however, it is
also known to be a liability for chip security. Research has shown that intellectual property …

Physical attack protection techniques for IC chip level hardware security

M Nagata, T Miki, N Miura - IEEE transactions on very large …, 2021 - ieeexplore.ieee.org
Secure hardware systems are threatened by adversarial attempts on integrated circuit (IC)
chips in a practical utilization environment. This article provides overviews of physical …

Hardware Root of Trust for SSN-basedDFT Ecosystems

J Rajski, M Trawka, J Tyszer… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
A hardware root of trust (RoT) is the foundation on which all secure operations of a circuit
depend, including those related to DFT. Despite many countermeasures aimed at facing …

Security & trusted devices in the context of internet of things (IoT)

N Sklavos, ID Zaharakis, A Kameas… - … Conference on Digital …, 2017 - ieeexplore.ieee.org
This work targets to the technologies of the Internet of Things (IoT), regarding to security and
trusted devices. It provides to the readers a comprehensive understanding of both security …

A lightweight true random number generator for root of trust applications

J Rajski, M Trawka, J Tyszer… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
There are many schemes proposed to protect integrated circuits (ICs) against an
unauthorized access and usage, or at least to mitigate security risks. They lay foundations …

H2B: Crypto Hash Functions Based on Hybrid Ring Generators

J Rajski, M Trawka, J Tyszer… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Protection of integrated circuits (ICs) against hardware security threats has been tackled by
many schemes proposed to mitigate risks associated with an unauthorized access and …

[PDF][PDF] An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes.

F Antognazza, A Barenghi, G Pelosi, R Susella - ICISSP, 2023 - scitepress.org
The significant effort in the research and design of large-scale quantum computers has
spurred a transition to post-quantum cryptographic primitives worldwide. The post-quantum …

SI ECCS: SECure context saving for IoT devices

E Valea, M Da Silva, G Di Natale… - … on design & …, 2018 - ieeexplore.ieee.org
Energy consumption of IoT devices is a very important issue. For this reason, many
techniques have been developed to allow IoT nodes to be aware of the amount of available …