Secure electronics enabled by atomically thin and photosensitive two-dimensional memtransistors

A Oberoi, A Dodda, H Liu, M Terrones, S Das - ACS nano, 2021 - ACS Publications
The rapid proliferation of security compromised hardware in today's integrated circuit (IC)
supply chain poses a global threat to the reliability of communication, computing, and control …

Attacks on cryptosystems implemented via VLSI: A review

MM Sravani, SA Durai - Journal of Information Security and Applications, 2021 - Elsevier
Serious threats to the VLSI crypto devices are posed by the Side Channel Attack (SCA) that
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …

Securing AI Hardware: Challenges in Detecting and Mitigating Hardware Trojans in ML Accelerators

KI Gubbi, I Kaur, A Hashem, SM PD… - 2023 IEEE 66th …, 2023 - ieeexplore.ieee.org
Artificial Intelligence (AI) has transformed multiple industries, creating specialized hardware
for AI/Machine Learning (ML) workloads. These hardware accelerators have become …

Logic Locking of Integrated Circuits Enabled by Nanoscale MoS2-Based Memtransistors

S Chakrabarti, A Wali, H Ravichandran… - ACS Applied Nano …, 2022 - ACS Publications
With an ever-increasing globalization of the semiconductor chip manufacturing supply chain
coupled with soaring complexity of modern-day integrated circuits (ICs), intellectual property …

Differential aging sensor using subthreshold leakage current to detect recycled ICs

T Alnuayri, S Khursheed… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Electronic system components can fall prey to counterfeiting via untrustworthy parties in the
semiconductor supply chain, which has established a worldwide span to reduce costs, time …

Impacts of machine learning on counterfeit IC detection and avoidance techniques

O Aramoon, G Qu - 2020 21st International Symposium on …, 2020 - ieeexplore.ieee.org
Globalization of integrated circuit (IC) supply chain has made counterfeiting a major source
of concern in the semiconductor industry. To address this concern, extensive efforts have …

Design of a BIST implemented AES crypto-processor ASIC

ML Ali, MS Rahman, FS Hossain - Plos one, 2021 - journals.plos.org
This paper presents the design of a Built-in-self-Test (BIST) implemented Advanced
Encryption Standard (AES) cryptoprocessor Application Specific Integrated Circuit (ASIC) …

Analysis of counterfeit electronics

G Mura, R Murru, G Martines - Microelectronics Reliability, 2020 - Elsevier
Counterfeit electronics pose reliability risks and severe harms. The failures of systems that
use counterfeits can cause safety and security problems. Lack of caution on the part of …

Prognostics and secure health management of electronic systems in a zero-trust environment

V Khemani, MH Azarian… - Annual Conference of the …, 2021 - papers.phmsociety.org
Prognostics and health management (PHM) is a multifaceted discipline for the assessment
of product degradation and reliability. PHM techniques have been used to detect naturally …

Full-Wave Modeling and Experimental Characterization of Electromagnetic Emissions From Printed Circuit Boards

J Lu, Y Ozturk, C Kesici, S Smith… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The phenomenon of electromagnetic (EM) emission from printed circuit boards (PCBs) is
demonstrated through numerical simulations as well as laboratory-scale measurements. On …