Covert channel communication as an emerging security threat in 2.5 D/3D integrated systems
In this paper, first, a broad overview of existing covert channel communication-based
security attacks is provided. Such covert channels establish a communication link between …
security attacks is provided. Such covert channels establish a communication link between …
Secure interposer-based heterogeneous integration
Secure Interposer-Based Heterogeneous Integration Page 1 156 2168-2364/22©2022 IEEE
Copublished by the IEEE CEDA, IEEE CASS, IEEE SSCS, and TTTC IEEE Design&Test …
Copublished by the IEEE CEDA, IEEE CASS, IEEE SSCS, and TTTC IEEE Design&Test …
GNN4IP: Graph neural network for hardware intellectual property piracy detection
Aggressive time-to-market constraints and enormous hardware design and fabrication costs
have pushed the semiconductor industry toward hardware Intellectual Properties (IP) core …
have pushed the semiconductor industry toward hardware Intellectual Properties (IP) core …
Secure and Scalable Key Management for Waferscale Heterogeneous Integration
In this paper, we assess PUF-based key management in emerging Chiplet technology. Our
central idea is to leverage an existing capability in modern chiplet systems called utility dies …
central idea is to leverage an existing capability in modern chiplet systems called utility dies …
Evaluating Vulnerability of Chiplet-Based Systems to Contactless Probing Techniques
Driven by a need for ever-increasing chip performance, a growing number of semiconductor
companies are opting for all-inclusive System-on-Chip (SoC) architectures. Increasingly, the …
companies are opting for all-inclusive System-on-Chip (SoC) architectures. Increasingly, the …
[PDF][PDF] Towards trustworthy computing on untrustworthy hardware
H Salem - 2023 - core.ac.uk
Historically, hardware was thought to be inherently secure and trusted due to its obscurity
and the isolated nature of its design and manufacturing. In the last two decades, however …
and the isolated nature of its design and manufacturing. In the last two decades, however …
Satisfiability Based Attacks
R Vemuri, S Chen - Split Manufacturing of Integrated Circuits for Hardware …, 2021 - Springer
In this chapter, we discuss an oracle-guided attack called the satisfiability (SAT) attack
against split manufactured ICs. In the design constraint based attacks, usually an attacker …
against split manufactured ICs. In the design constraint based attacks, usually an attacker …