An overview of cyber-resilient smart inverters based on practical attack models

BH Ahn, T Kim, S Ahmad, SK Mazumder… - … on Power Electronics, 2023 - ieeexplore.ieee.org
With high penetration of distributed energy resources (DERs), power systems are
increasingly transforming into distributed power grids, which provide grid automation …

On malicious implants in PCBs throughout the supply chain

J Harrison, N Asadizanjani, M Tehranipoor - Integration, 2021 - Elsevier
The PCB supply chain has become globally distributed such that PCBs are vulnerable to
hardware Trojan attacks. Moreover, attacks on PCBs are possible even after a system is …

Notchpuf: Printed circuit board puf based on microstrip notch filter

M Martin, J Plusquellic - Cryptography, 2020 - mdpi.com
Physical Unclonable Functions (PUFs) are primitives that are designed to leverage naturally
occurring variations to produce a random bitstring. Current PUF designs are typically …

A Chip-PCB Hybrid SC PUF Used for Anti-Desoldering and Depackaging-Attack Protection

M Wan, Z Zhang, Y Zhang, Z He, H Gu… - IEEE Journal of Solid …, 2024 - ieeexplore.ieee.org
By sensing and changing the parasitic capacitance mismatch of chip pads, bumps or
bonding wires, package substrate and balls, and printed circuit board (PCB) solder joints …

Security of microfluidic biochip: Practical attacks and countermeasures

H Chen, S Potluri, F Koushanfar - ACM Transactions on Design …, 2020 - dl.acm.org
With the advancement of system miniaturization and automation, Lab-on-a-Chip (LoC)
technology has revolutionized traditional experimental procedures. Microfluidic Biochip …

[图书][B] Investigation into detection of hardware trojans on printed circuit boards

G Piliposyan - 2023 - search.proquest.com
The modern semiconductor device manufacturing flow is becoming increasingly vulnerable
to malicious implants called Hardware Trojans (HT). With HTs becoming stealthier a need …

Permutation network de-obfuscation: A delay-based attack and countermeasure investigation

Z Guo, S Chowdhury, MM Tehranipoor… - ACM Journal on Emerging …, 2020 - dl.acm.org
Permutation-based obfuscation has been proposed to protect hardware against cloning,
overproduction, reverse engineering, and unauthorized operation. To prevent key extraction …

Hardware Trojans in Microfluidic Biochips: Principles and Practice

DK Dalei, D Gountia - Advancing Computational Intelligence …, 2022 - taylorfrancis.com
A hardware Trojan (HT) is defined as a malicious component that is intentionally placed
inside an IC to carry out harmful activity. HTs are basically modeled to secretly tweak the …

PCB Netlist Obfuscation with Micro Electro Mechanical Systems and Additive Manufacturing Techniques

J True, C Xi, A Khan, J Hihath… - … for Testing and …, 2021 - dl.asminternational.org
Semiconductor manufacturing, including the multistep fabrication of ICs and tedious
assembly of PCBs, has been outsourced to untrusted regions due to globalization. This …

[PDF][PDF] A Comprehensive PCB Assurance Benchmark

J Harrison, P Calzada, N Asadizanjani, M Tehranipoor - cyan.engineering.osu.edu
The globalization of printed circuit board (PCB) manufacturing has rendered PCBs
vulnerable to Trojan insertion by untrusted parties in the supply chain. Moreover, PCB …