Secure electronics enabled by atomically thin and photosensitive two-dimensional memtransistors
The rapid proliferation of security compromised hardware in today's integrated circuit (IC)
supply chain poses a global threat to the reliability of communication, computing, and control …
supply chain poses a global threat to the reliability of communication, computing, and control …
Attacks on cryptosystems implemented via VLSI: A review
MM Sravani, SA Durai - Journal of Information Security and Applications, 2021 - Elsevier
Serious threats to the VLSI crypto devices are posed by the Side Channel Attack (SCA) that
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …
Securing AI Hardware: Challenges in Detecting and Mitigating Hardware Trojans in ML Accelerators
Artificial Intelligence (AI) has transformed multiple industries, creating specialized hardware
for AI/Machine Learning (ML) workloads. These hardware accelerators have become …
for AI/Machine Learning (ML) workloads. These hardware accelerators have become …
Logic Locking of Integrated Circuits Enabled by Nanoscale MoS2-Based Memtransistors
S Chakrabarti, A Wali, H Ravichandran… - ACS Applied Nano …, 2022 - ACS Publications
With an ever-increasing globalization of the semiconductor chip manufacturing supply chain
coupled with soaring complexity of modern-day integrated circuits (ICs), intellectual property …
coupled with soaring complexity of modern-day integrated circuits (ICs), intellectual property …
Differential aging sensor using subthreshold leakage current to detect recycled ICs
T Alnuayri, S Khursheed… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Electronic system components can fall prey to counterfeiting via untrustworthy parties in the
semiconductor supply chain, which has established a worldwide span to reduce costs, time …
semiconductor supply chain, which has established a worldwide span to reduce costs, time …
Impacts of machine learning on counterfeit IC detection and avoidance techniques
O Aramoon, G Qu - 2020 21st International Symposium on …, 2020 - ieeexplore.ieee.org
Globalization of integrated circuit (IC) supply chain has made counterfeiting a major source
of concern in the semiconductor industry. To address this concern, extensive efforts have …
of concern in the semiconductor industry. To address this concern, extensive efforts have …
Design of a BIST implemented AES crypto-processor ASIC
ML Ali, MS Rahman, FS Hossain - Plos one, 2021 - journals.plos.org
This paper presents the design of a Built-in-self-Test (BIST) implemented Advanced
Encryption Standard (AES) cryptoprocessor Application Specific Integrated Circuit (ASIC) …
Encryption Standard (AES) cryptoprocessor Application Specific Integrated Circuit (ASIC) …
Analysis of counterfeit electronics
Counterfeit electronics pose reliability risks and severe harms. The failures of systems that
use counterfeits can cause safety and security problems. Lack of caution on the part of …
use counterfeits can cause safety and security problems. Lack of caution on the part of …
Prognostics and secure health management of electronic systems in a zero-trust environment
V Khemani, MH Azarian… - Annual Conference of the …, 2021 - papers.phmsociety.org
Prognostics and health management (PHM) is a multifaceted discipline for the assessment
of product degradation and reliability. PHM techniques have been used to detect naturally …
of product degradation and reliability. PHM techniques have been used to detect naturally …
Full-Wave Modeling and Experimental Characterization of Electromagnetic Emissions From Printed Circuit Boards
The phenomenon of electromagnetic (EM) emission from printed circuit boards (PCBs) is
demonstrated through numerical simulations as well as laboratory-scale measurements. On …
demonstrated through numerical simulations as well as laboratory-scale measurements. On …