Covert channel communication as an emerging security threat in 2.5 D/3D integrated systems

I Miketic, K Dhananjay, E Salman - Sensors, 2023 - mdpi.com
In this paper, first, a broad overview of existing covert channel communication-based
security attacks is provided. Such covert channels establish a communication link between …

Secure interposer-based heterogeneous integration

MSM Khan, C **, AA Khan, MT Rahman… - IEEE Design & …, 2022 - ieeexplore.ieee.org
Secure Interposer-Based Heterogeneous Integration Page 1 156 2168-2364/22©2022 IEEE
Copublished by the IEEE CEDA, IEEE CASS, IEEE SSCS, and TTTC IEEE Design&Test …

GNN4IP: Graph neural network for hardware intellectual property piracy detection

R Yasaei, SY Yu, EK Naeini… - 2021 58th ACM/IEEE …, 2021 - ieeexplore.ieee.org
Aggressive time-to-market constraints and enormous hardware design and fabrication costs
have pushed the semiconductor industry toward hardware Intellectual Properties (IP) core …

Secure and Scalable Key Management for Waferscale Heterogeneous Integration

Y Safari, P Aghanoury, SS Iyer… - 2023 IEEE 73rd …, 2023 - ieeexplore.ieee.org
In this paper, we assess PUF-based key management in emerging Chiplet technology. Our
central idea is to leverage an existing capability in modern chiplet systems called utility dies …

Evaluating Vulnerability of Chiplet-Based Systems to Contactless Probing Techniques

A Deric, K Mitard, S Tajik… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Driven by a need for ever-increasing chip performance, a growing number of semiconductor
companies are opting for all-inclusive System-on-Chip (SoC) architectures. Increasingly, the …

[PDF][PDF] Towards trustworthy computing on untrustworthy hardware

H Salem - 2023 - core.ac.uk
Historically, hardware was thought to be inherently secure and trusted due to its obscurity
and the isolated nature of its design and manufacturing. In the last two decades, however …

Satisfiability Based Attacks

R Vemuri, S Chen - Split Manufacturing of Integrated Circuits for Hardware …, 2021 - Springer
In this chapter, we discuss an oracle-guided attack called the satisfiability (SAT) attack
against split manufactured ICs. In the design constraint based attacks, usually an attacker …