Device-specific security challenges and solution in IoT edge computing: a review

A Roy, J Kokila, N Ramasubramanian… - The Journal of …, 2023 - Springer
Rapid growth in IoT technology demands the need for the emergence of new IoT devices.
IoT devices vary in terms of shape, size, storage, battery life, and computational power …

A modern approach to IP protection and trojan prevention: Split manufacturing for 3D ICs and obfuscation of vertical interconnects

S Patnaik, M Ashraf, O Sinanoglu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Split manufacturing (SM) and layout camouflaging (LC) are two promising techniques to
obscure integrated circuits (ICs) from malicious entities during and after manufacturing …

Concerted wire lifting: Enabling secure and cost-effective split manufacturing

S Patnaik, M Ashraf, H Li, J Knechtel… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this work, we advance the security promise of split manufacturing through judicious
handling of interconnects. First, we study the cost-security tradeoffs underlying for split …

ACED-IT: Assuring confidential electronic design against insider threats in a zero-trust environment

A Stern, H Wang, F Rahman… - … on Computer-Aided …, 2021 - ieeexplore.ieee.org
The electronics supply chain has adapted into a global process over the past two decades to
support the cost of process optimization. As the semiconductor industry has transitioned from …

A practical split manufacturing framework for trojan prevention via simultaneous wire lifting and cell insertion

M Li, B Yu, Y Lin, X Xu, W Li… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Trojans and backdoors inserted by untrusted foundries have become serious threats to
hardware security. Split manufacturing is proposed to hide important circuit structures and …

Hardware Trojan prevention using memristor technology

TM Supon, R Rashidzadeh - Microprocessors and Microsystems, 2023 - Elsevier
The design of modern integrated circuits includes many steps and different entities providing
opportunities to adversaries for Trojan injection or IP (intellectual property) piracy at different …

Deterrent approaches against hardware trojan insertion

Q Shi, D Forte, MM Tehranipoor - The Hardware Trojan War: Attacks …, 2018 - Springer
Deterrent approaches against hardware Trojan insertions are techniques designed for
device producers, especially integrated circuit (IC) producers to discourage hardware Trojan …

[BOK][B] A synergistic framework for hardware ip privacy and integrity protection

M Li, DZ Pan - 2020 - Springer
As the technology node scales down to 45 nm and beyond, the significant increase in
design complexity and cost propels the globalization of the $400-billion semiconductor …

A Design for Test and Security Methodology for Integrated Circuits

TM Supon - 2021 - search.proquest.com
The costs of in-house IC fabrication have increased significantly with new technology nodes
and nanoscale transistors. Many companies have outsourced their need for IC fabrication to …

Defenses Against Satisfiability Based Attacks

R Vemuri, S Chen - Split Manufacturing of Integrated Circuits for Hardware …, 2021 - Springer
Satisfiability based attacks discussed in the previous chapter formulate the attack as a
satisfiability problem and use SAT solvers to find a netlist to layout map** or to recover the …