Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives

UJ Botero, R Wilson, H Lu, MT Rahman… - ACM Journal on …, 2021 - dl.acm.org
In the context of hardware trust and assurance, reverse engineering has been often
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …

Hardware and information security primitives based on 2D materials and devices

A Wali, S Das - Advanced Materials, 2023 - Wiley Online Library
Hardware security is a major concern for the entire semiconductor ecosystem that accounts
for billions of dollars in annual losses. Similarly, information security is a critical need for the …

A comprehensive study of security of internet-of-things

A Mosenia, NK Jha - IEEE Transactions on emerging topics in …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …

On improving the security of logic locking

M Yasin, JJV Rajendran, O Sinanoglu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Due to globalization of integrated circuit (IC) design flow, rogue elements in the supply chain
can pirate ICs, overbuild ICs, and insert hardware Trojans. EPIC locks the design by …

A survey on chip to system reverse engineering

SE Quadir, J Chen, D Forte, N Asadizanjani… - ACM journal on …, 2016 - dl.acm.org
The reverse engineering (RE) of electronic chips and systems can be used with honest and
dishonest intentions. To inhibit RE for those with dishonest intentions (eg, piracy and …

A blockchain-based framework for supply chain provenance

P Cui, J Dixon, U Guin, D Dimase - IEEE Access, 2019 - ieeexplore.ieee.org
The complexity of the electronics supply chain has grown significantly due to the expansion
of globalization in the 21st century. Electronic parts are now manufactured, distributed, and …

[ΒΙΒΛΙΟ][B] Counterfeit integrated circuits

M Tehranipoor, U Guin, D Forte, M Tehranipoor, U Guin… - 2015 - Springer
Counterfeit integrated circuits (ICs) pose a major concern to the industry and government as
they potentially impact the security and reliability of a wide variety of electronic systems. A …

The key is left under the mat: On the inappropriate security assumption of logic locking schemes

MT Rahman, S Tajik, MS Rahman… - … Security and Trust …, 2020 - ieeexplore.ieee.org
Logic locking has been proposed as an obfuscation technique to protect outsourced IC
designs from IP piracy by untrusted entities in the design and fabrication process. In this …

A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective

HA Abdul-Ghani, D Konstantas - Journal of Sensor and Actuator …, 2019 - mdpi.com
As Internet of Things (IoT) involvement increases in our daily lives, several security and
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …

Electronics supply chain integrity enabled by blockchain

X Xu, F Rahman, B Shakya, A Vassilev… - ACM Transactions on …, 2019 - dl.acm.org
Electronic systems are ubiquitous today, playing an irreplaceable role in our personal lives,
as well as in critical infrastructures such as power grids, satellite communications, and public …