A survey on machine learning against hardware trojan attacks: Recent advances and challenges
Z Huang, Q Wang, Y Chen, X Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
The remarkable success of machine learning (ML) in a variety of research domains has
inspired academic and industrial communities to explore its potential to address hardware …
inspired academic and industrial communities to explore its potential to address hardware …
Monolithic 3D Integrated circuits: Recent trends and future prospects
Monolithic 3D integration technology has emerged as an alternative candidate to
conventional transistor scaling. Unlike conventional processes where multiple metal layers …
conventional transistor scaling. Unlike conventional processes where multiple metal layers …
Covert channel communication as an emerging security threat in 2.5 d/3d integrated systems
In this paper, first, a broad overview of existing covert channel communication-based
security attacks is provided. Such covert channels establish a communication link between …
security attacks is provided. Such covert channels establish a communication link between …
Hardware security exploiting post-CMOS devices: fundamental device characteristics, state-of-the-art countermeasures, challenges and roadmap
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing
hardware-oriented security and trust. However, implementing hardware security primitives …
hardware-oriented security and trust. However, implementing hardware security primitives …
Large-scale 3D chips: Challenges and solutions for design automation, testing, and trustworthy integration
Three-dimensional (3D) integration of electronic chips has been advocated by both industry
and academia for many years. It is acknowledged as one of the most promising approaches …
and academia for many years. It is acknowledged as one of the most promising approaches …
TREEHOUSE: A Secure Asset Management Infrastructure for Protecting 3DIC Designs
The push to meet growing user requirements and manufacturing challenges at lower
technology nodes have motivated chip designers to adopt non-traditional design …
technology nodes have motivated chip designers to adopt non-traditional design …
Hardware security for and beyond CMOS technology: an overview on fundamentals, applications, and challenges
J Knechtel - Proceedings of the 2020 International Symposium on …, 2020 - dl.acm.org
As with most aspects of electronic systems and integrated circuits, hardware security has
traditionally evolved around the dominant CMOS technology. However, with the rise of …
traditionally evolved around the dominant CMOS technology. However, with the rise of …
LLFI: Lateral laser fault injection attack
J Rodriguez, A Baldomero, V Montilla… - 2019 Workshop on …, 2019 - ieeexplore.ieee.org
In this work, a novel technique of fault injection attack on secure integrated circuits (ICs)
devices is presented: Lateral Laser Fault Injection (LLFI). Laser Fault Injection with backside …
devices is presented: Lateral Laser Fault Injection (LLFI). Laser Fault Injection with backside …
Hardware security for and beyond CMOS technology
J Knechtel - Proceedings of the 2021 International Symposium on …, 2021 - dl.acm.org
As with most aspects of electronic systems and integrated circuits, hardware security has
traditionally evolved around the dominant CMOS technology. However, with the rise of …
traditionally evolved around the dominant CMOS technology. However, with the rise of …
Exploring the security landscape: NoC-based MPSoC to Cloud-of-Chips
G Sharma, G Bousdras, S Ellinidou… - Microprocessors and …, 2021 - Elsevier
In this paper, we present a detailed and systematic overview of communication security
aspects of Multi-Processor Systems-on-Chip (MPSoC) and the emerging potential threats on …
aspects of Multi-Processor Systems-on-Chip (MPSoC) and the emerging potential threats on …