An overview of cyber-resilient smart inverters based on practical attack models
With high penetration of distributed energy resources (DERs), power systems are
increasingly transforming into distributed power grids, which provide grid automation …
increasingly transforming into distributed power grids, which provide grid automation …
On malicious implants in PCBs throughout the supply chain
J Harrison, N Asadizanjani, M Tehranipoor - Integration, 2021 - Elsevier
The PCB supply chain has become globally distributed such that PCBs are vulnerable to
hardware Trojan attacks. Moreover, attacks on PCBs are possible even after a system is …
hardware Trojan attacks. Moreover, attacks on PCBs are possible even after a system is …
Notchpuf: Printed circuit board puf based on microstrip notch filter
M Martin, J Plusquellic - Cryptography, 2020 - mdpi.com
Physical Unclonable Functions (PUFs) are primitives that are designed to leverage naturally
occurring variations to produce a random bitstring. Current PUF designs are typically …
occurring variations to produce a random bitstring. Current PUF designs are typically …
A Chip-PCB Hybrid SC PUF Used for Anti-Desoldering and Depackaging-Attack Protection
M Wan, Z Zhang, Y Zhang, Z He, H Gu… - IEEE Journal of Solid …, 2024 - ieeexplore.ieee.org
By sensing and changing the parasitic capacitance mismatch of chip pads, bumps or
bonding wires, package substrate and balls, and printed circuit board (PCB) solder joints …
bonding wires, package substrate and balls, and printed circuit board (PCB) solder joints …
Security of microfluidic biochip: Practical attacks and countermeasures
With the advancement of system miniaturization and automation, Lab-on-a-Chip (LoC)
technology has revolutionized traditional experimental procedures. Microfluidic Biochip …
technology has revolutionized traditional experimental procedures. Microfluidic Biochip …
[图书][B] Investigation into detection of hardware trojans on printed circuit boards
G Piliposyan - 2023 - search.proquest.com
The modern semiconductor device manufacturing flow is becoming increasingly vulnerable
to malicious implants called Hardware Trojans (HT). With HTs becoming stealthier a need …
to malicious implants called Hardware Trojans (HT). With HTs becoming stealthier a need …
Permutation network de-obfuscation: A delay-based attack and countermeasure investigation
Permutation-based obfuscation has been proposed to protect hardware against cloning,
overproduction, reverse engineering, and unauthorized operation. To prevent key extraction …
overproduction, reverse engineering, and unauthorized operation. To prevent key extraction …
Hardware Trojans in Microfluidic Biochips: Principles and Practice
A hardware Trojan (HT) is defined as a malicious component that is intentionally placed
inside an IC to carry out harmful activity. HTs are basically modeled to secretly tweak the …
inside an IC to carry out harmful activity. HTs are basically modeled to secretly tweak the …
PCB Netlist Obfuscation with Micro Electro Mechanical Systems and Additive Manufacturing Techniques
Semiconductor manufacturing, including the multistep fabrication of ICs and tedious
assembly of PCBs, has been outsourced to untrusted regions due to globalization. This …
assembly of PCBs, has been outsourced to untrusted regions due to globalization. This …
[PDF][PDF] A Comprehensive PCB Assurance Benchmark
J Harrison, P Calzada, N Asadizanjani, M Tehranipoor - cyan.engineering.osu.edu
The globalization of printed circuit board (PCB) manufacturing has rendered PCBs
vulnerable to Trojan insertion by untrusted parties in the supply chain. Moreover, PCB …
vulnerable to Trojan insertion by untrusted parties in the supply chain. Moreover, PCB …