Lightweight secure pufs
To ensure security and robustness of the next generation of Physically Unclonable
Functions (PUFs), we have developed a new methodology for PUF design. Our approach …
Functions (PUFs), we have developed a new methodology for PUF design. Our approach …
Securing Computer Hardware Using 3D Integrated Circuit ({{{{{IC}}}}}) Technology and Split Manufacturing for Obfuscation
The fabrication of digital Integrated Circuits (ICs) is increasingly outsourced. Given this trend,
security is recognized as an important issue. The threat agent is an attacker at the IC foundry …
security is recognized as an important issue. The threat agent is an attacker at the IC foundry …
3D facial expression recognition based on primitive surface feature distribution
The creation of facial range models by 3D imaging systems has led to extensive work on 3D
face recognition [19]. However, little work has been done to study the usefulness of such …
face recognition [19]. However, little work has been done to study the usefulness of such …
Testing techniques for hardware security
System security has emerged as a premier design requirement. While there has been an
enormous body of impressive work on testing integrated circuits (ICs) desiderata such as …
enormous body of impressive work on testing integrated circuits (ICs) desiderata such as …
Reliable PUF-based local authentication with self-correction
Physical unclonable functions (PUFs) can extract chip-unique signatures from integrated
circuits (ICs) by exploiting the uncontrollable randomness due to manufacturing process …
circuits (ICs) by exploiting the uncontrollable randomness due to manufacturing process …
A touch of evil: High-assurance cryptographic hardware from untrusted components
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly
defined, designed and fabricated in different premises across the world. This reduces …
defined, designed and fabricated in different premises across the world. This reduces …
Designer's hardware Trojan horse
We introduce the first approach for pre-synthesis embedding of hardware Trojan horses
(HTHs) by the designer. The embedded HTH gives the designer a low layer control over the …
(HTHs) by the designer. The embedded HTH gives the designer a low layer control over the …
Provably secure obfuscation of diverse watermarks for sequential circuits
This paper presents a provably secure method for embedding multiple watermarks in
sequential designs. A number of different watermarks signed with the IP owner's secret key …
sequential designs. A number of different watermarks signed with the IP owner's secret key …
Aging adaption in integrated circuits using a novel built-in sensor
X Wang, LR Winemberg, D Su, D Tran… - … on Computer-Aided …, 2014 - ieeexplore.ieee.org
As process technology further scales, aging, noise and variations in integrated circuits (ICs)
and systems become a major challenge to both the semiconductor and electronic design …
and systems become a major challenge to both the semiconductor and electronic design …
A novel peak power supply noise measurement and adaptation system for integrated circuits
X Wang, D Zhang, D Su, L Winemberg… - … Transactions on Very …, 2015 - ieeexplore.ieee.org
For 45-nm technologies and below, the maximum operation frequency of integrated circuits
(ICs) has reached multiple gigahertz. At the same time, the size of modern ICs has increased …
(ICs) has reached multiple gigahertz. At the same time, the size of modern ICs has increased …