Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives

UJ Botero, R Wilson, H Lu, MT Rahman… - ACM Journal on …, 2021 - dl.acm.org
In the context of hardware trust and assurance, reverse engineering has been often
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …

Hardware and information security primitives based on 2D materials and devices

A Wali, S Das - Advanced Materials, 2023 - Wiley Online Library
Hardware security is a major concern for the entire semiconductor ecosystem that accounts
for billions of dollars in annual losses. Similarly, information security is a critical need for the …

A survey on supply chain security: Application areas, security threats, and solution architectures

V Hassija, V Chamola, V Gupta, S Jain… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
The rapid improvement in the global connectivity standards has escalated the level of trade
taking place among different parties. Advanced communication standards are allowing the …

Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks

X Xu, B Shakya, MM Tehranipoor, D Forte - Cryptographic Hardware and …, 2017 - Springer
Logic locking has emerged as a promising technique for protecting gate-level
semiconductor intellectual property. However, recent work has shown that such gate-level …

A blockchain-based framework for supply chain provenance

P Cui, J Dixon, U Guin, D Dimase - IEEE Access, 2019 - ieeexplore.ieee.org
The complexity of the electronics supply chain has grown significantly due to the expansion
of globalization in the 21st century. Electronic parts are now manufactured, distributed, and …

The big hack explained: Detection and prevention of PCB supply chain implants

D Mehta, H Lu, OP Paradis, MA MS… - ACM Journal on …, 2020 - dl.acm.org
Over the past two decades, globalized outsourcing in the semiconductor supply chain has
lowered manufacturing costs and shortened the time-to-market for original equipment …

CAS-Lock: A security-corruptibility trade-off resilient logic locking scheme

B Shakya, X Xu, M Tehranipoor, D Forte - IACR Transactions on …, 2020 - tches.iacr.org
Logic locking has recently been proposed as a solution for protecting gatelevel
semiconductor intellectual property (IP). However, numerous attacks have been mounted on …

The hardware trojan war

S Bhunia, M Tehranipoor - Cham,, Switzerland: Springer, 2018 - Springer
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …

Electronics supply chain integrity enabled by blockchain

X Xu, F Rahman, B Shakya, A Vassilev… - ACM Transactions on …, 2019 - dl.acm.org
Electronic systems are ubiquitous today, playing an irreplaceable role in our personal lives,
as well as in critical infrastructures such as power grids, satellite communications, and public …

Robust design-for-security architecture for enabling trust in IC manufacturing and test

U Guin, Z Zhou, A Singh - … on Very Large Scale Integration (VLSI …, 2018 - ieeexplore.ieee.org
Due to the prohibitive costs of semiconductor manufacturing, most system-on-chip design
companies outsource their production to offshore foundries. As most of these devices are …