Semiconductor supply chain resilience and disruption: Insights, mitigation, and future directions

W **ong, DD Wu, JHY Yeung - International Journal of Production …, 2024 - Taylor & Francis
In recent years, the semiconductor supply chain has experienced dramatic changes, due to
geopolitical tensions and public health events, which have provided insights into supply …

Hardware Trojans Detection and Prevention Techniques Review

R Naveenkumar, NM Sivamangai - Wireless Personal Communications, 2024 - Springer
Technological developments in semiconductors have created previously unheard-of
chances for creativity, but they have also increased the danger of hardware Trojans, which …

[PDF][PDF] PORTAL: Fast and Secure Device Access with Arm CCA for Modern Arm Mobile System-on-Chips (SoCs)

F Sang, J Lee, X Zhang, T Kim - Proceedings of the 2025 IEEE Symposium …, 2025 - gts3.org
The increasing integration of diverse co-processors and peripherals within mobile Arm
System-on-Chips (SoCs) presents significant challenges for secure and efficient device I/O …

[HTML][HTML] Mitigating Thermal Side-Channel Vulnerabilities in FPGA-Based SiP Systems Through Advanced Thermal Management and Security Integration Using …

AZ Benelhaouare, I Mellal, M Oumlaz, A Lakhssassi - Electronics, 2024 - mdpi.com
Side-channel attacks (SCAs) are powerful techniques used to recover keys from electronic
devices by exploiting various physical leakages, such as power, timing, and heat. Although …

Detection of Voltage Droop-Induced Timing Fault Attacks Due to Hardware Trojans

J Talukdar, A Vyas… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Recent breakthroughs in heterogeneous integration (HI) using 2.5-D/3-D packaging
technology have led to several advances in the semiconductor industry, increasing yield …

Enhanced lightweight encryption algorithm based on chaotic systems

A Abdelli, WEH Youssef, L Khriji, M Machhout - Physica Scripta, 2024 - iopscience.iop.org
In order to improve security and efficiency, this study presents a novel lightweight encryption
technique that makes use of chaotic systems. Our method creatively combines the new …

SAP: Silicon Authentication Platform for System-on-Chip Supply Chain Vulnerabilities

MSUI Sami, J Zhou, SK Saha, F Rahman… - … Analysis of Systems …, 2024 - ieeexplore.ieee.org
The increasing complexity of system-on-chip (SoC) designs, prompted by the integration of
additional functionalities, has led to a reliance on global sources in the SoC supply chain …

SECT-HI: Enabling Secure Testing for Heterogeneous Integration to Prevent SiP Counterfeits

GI Haidar, MSUI Sami, J Zhou, KZ Azar… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
Due to Moore's law limitations, SiP became popular in recent years among industries to
increase functionality density, by integrating multiple chiplets on a shared interposer …

HI-SST: Safeguarding SiP Authenticity Through Secure Split-Test in Heterogeneous Integration

PE Calzada, MSUI Sami, J Zhou… - 2024 IEEE Computer …, 2024 - ieeexplore.ieee.org
In response to the evolving semiconductor landscape in light of Moore's law limitations, the
industry has embraced System-in-Packages (SiPs) to increase functionality density, utilizing …

Virtual Power Plants Security Challenges, Solutions, and Emerging Trends: A Review

SP Rao, RS Tiruvalluru, SRA Balaji… - 2024 Cyber …, 2024 - ieeexplore.ieee.org
Virtual power plants (VPPs) are used to manage and integrate renewable energy resources
for better management and coordination. This integration, combined with modern …