Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives
In the context of hardware trust and assurance, reverse engineering has been often
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …
Hardware and information security primitives based on 2D materials and devices
Hardware security is a major concern for the entire semiconductor ecosystem that accounts
for billions of dollars in annual losses. Similarly, information security is a critical need for the …
for billions of dollars in annual losses. Similarly, information security is a critical need for the …
A survey on supply chain security: Application areas, security threats, and solution architectures
The rapid improvement in the global connectivity standards has escalated the level of trade
taking place among different parties. Advanced communication standards are allowing the …
taking place among different parties. Advanced communication standards are allowing the …
Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks
Logic locking has emerged as a promising technique for protecting gate-level
semiconductor intellectual property. However, recent work has shown that such gate-level …
semiconductor intellectual property. However, recent work has shown that such gate-level …
A blockchain-based framework for supply chain provenance
The complexity of the electronics supply chain has grown significantly due to the expansion
of globalization in the 21st century. Electronic parts are now manufactured, distributed, and …
of globalization in the 21st century. Electronic parts are now manufactured, distributed, and …
The big hack explained: Detection and prevention of PCB supply chain implants
Over the past two decades, globalized outsourcing in the semiconductor supply chain has
lowered manufacturing costs and shortened the time-to-market for original equipment …
lowered manufacturing costs and shortened the time-to-market for original equipment …
CAS-Lock: A security-corruptibility trade-off resilient logic locking scheme
Logic locking has recently been proposed as a solution for protecting gatelevel
semiconductor intellectual property (IP). However, numerous attacks have been mounted on …
semiconductor intellectual property (IP). However, numerous attacks have been mounted on …
The hardware trojan war
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …
the information being processed. The underlying hardware used for information processing …
Electronics supply chain integrity enabled by blockchain
Electronic systems are ubiquitous today, playing an irreplaceable role in our personal lives,
as well as in critical infrastructures such as power grids, satellite communications, and public …
as well as in critical infrastructures such as power grids, satellite communications, and public …
Robust design-for-security architecture for enabling trust in IC manufacturing and test
Due to the prohibitive costs of semiconductor manufacturing, most system-on-chip design
companies outsource their production to offshore foundries. As most of these devices are …
companies outsource their production to offshore foundries. As most of these devices are …