Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives
In the context of hardware trust and assurance, reverse engineering has been often
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …
Hardware and information security primitives based on 2D materials and devices
Hardware security is a major concern for the entire semiconductor ecosystem that accounts
for billions of dollars in annual losses. Similarly, information security is a critical need for the …
for billions of dollars in annual losses. Similarly, information security is a critical need for the …
A comprehensive study of security of internet-of-things
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …
transformative approach for providing numerous services. Compact smart devices constitute …
On improving the security of logic locking
Due to globalization of integrated circuit (IC) design flow, rogue elements in the supply chain
can pirate ICs, overbuild ICs, and insert hardware Trojans. EPIC locks the design by …
can pirate ICs, overbuild ICs, and insert hardware Trojans. EPIC locks the design by …
A survey on chip to system reverse engineering
The reverse engineering (RE) of electronic chips and systems can be used with honest and
dishonest intentions. To inhibit RE for those with dishonest intentions (eg, piracy and …
dishonest intentions. To inhibit RE for those with dishonest intentions (eg, piracy and …
A blockchain-based framework for supply chain provenance
The complexity of the electronics supply chain has grown significantly due to the expansion
of globalization in the 21st century. Electronic parts are now manufactured, distributed, and …
of globalization in the 21st century. Electronic parts are now manufactured, distributed, and …
[ΒΙΒΛΙΟ][B] Counterfeit integrated circuits
Counterfeit integrated circuits (ICs) pose a major concern to the industry and government as
they potentially impact the security and reliability of a wide variety of electronic systems. A …
they potentially impact the security and reliability of a wide variety of electronic systems. A …
The key is left under the mat: On the inappropriate security assumption of logic locking schemes
Logic locking has been proposed as an obfuscation technique to protect outsourced IC
designs from IP piracy by untrusted entities in the design and fabrication process. In this …
designs from IP piracy by untrusted entities in the design and fabrication process. In this …
A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective
As Internet of Things (IoT) involvement increases in our daily lives, several security and
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …
Electronics supply chain integrity enabled by blockchain
Electronic systems are ubiquitous today, playing an irreplaceable role in our personal lives,
as well as in critical infrastructures such as power grids, satellite communications, and public …
as well as in critical infrastructures such as power grids, satellite communications, and public …