Hardware trojan detection using machine learning: A tutorial

KI Gubbi, B Saber Latibari, A Srikanth… - ACM Transactions on …, 2023 - dl.acm.org
With the growth and globalization of IC design and development, there is an increase in the
number of Designers and Design houses. As setting up a fabrication facility may easily cost …

Bit selection algorithm suitable for high-volume production of SRAM-PUF

K **ao, MT Rahman, D Forte, Y Huang… - … oriented security and …, 2014 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) are impacted by environmental variations and
aging which can reduce their acceptance in identification and authentication applications …

Design and implementation of high-quality physical unclonable functions for hardware-oriented cryptography

SS Zalivaka, L Zhang, VP Klybik, AA Ivaniuk… - Secure System Design …, 2016 - Springer
Abstract Physical Unclonable Functions have emerged as effective primitives for varieties of
security applications. With the advent of mobile computing, designing and implementing …

Circuit timing signature (CTS) for detection of counterfeit integrated circuits

K **ao, D Forte, M Tehranipoor - Secure System Design and Trustable …, 2016 - Springer
Counterfeit integrated circuits (ICs) have been on the rise over the past decade and
represent a major concern. Counterfeits impact the security and reliability of electronic …

PowerID: Using Supply-Side Impedances of Power Delivery Networks as Signatures for Consumer Electronics

I Miketic, E Salman - IEEE Transactions on Consumer …, 2023 - ieeexplore.ieee.org
Integrated circuits (ICs) have become increasingly susceptible to counterfeiting due to
globalization of the semiconductor supply chain. In this paper, this issue is addressed with a …

Security assessment of high-level synthesis

MR Muttaki, N Pundir, M Tehranipoor… - Emerging Topics in …, 2020 - Springer
Securing intellectual property (IP) blocks have become a huge concern for the designers
due to increasing attacks at different stages of the design. This wide array of attacks from IP …

Techniques for improving security and trustworthiness of integrated circuits

K **ao - 2015 - digitalcommons.lib.uconn.edu
The integrated circuit (IC) development process is becoming increasingly vulnerable to
malicious activities because untrusted parties could be involved in this IC development flow …

Blockchain-Enabled Electronics Supply Chain Assurance

F Rahman, M Tehranipoor - Emerging Topics in Hardware Security, 2020 - Springer
Electronic systems are ubiquitous today, playing an irreplaceable role in our personal lives
as well as in critical infrastructures such as power grid, satellite communication, and public …

Methods for protecting intellectual property of IP cores designers

B Colombier - 2017 - theses.hal.science
Designing integrated circuits is now an extremely complex task. This is why designers adopt
a modular approach, where each functional block is described independently. These …

Hardware Security Techniques Against Information Leakage and Counterfeiting in Integrated Circuits

I Miketic - 2023 - search.proquest.com
Security challenges in emerging computing technologies pose serious risks. Users are
typically familiar with the software side of information security. The hardware aspect …