Protect your chip design intellectual property: An overview

J Knechtel, S Patnaik, O Sinanoglu - Proceedings of the International …, 2019 - dl.acm.org
The increasing cost of integrated circuit (IC) fabrication has driven most companies to" go
fabless" over time. The corresponding outsourcing trend gave rise to various attack vectors …

Hardware security for and beyond CMOS technology: an overview on fundamentals, applications, and challenges

J Knechtel - Proceedings of the 2020 International Symposium on …, 2020 - dl.acm.org
As with most aspects of electronic systems and integrated circuits, hardware security has
traditionally evolved around the dominant CMOS technology. However, with the rise of …

Security promises and vulnerabilities in emerging reconfigurable nanotechnology-based circuits

S Rai, S Patnaik, A Rupani, J Knechtel… - … on Emerging Topics …, 2020 - ieeexplore.ieee.org
Reconfigurable field-effect transistors (RFETs) based on emerging nanotechnologies allow
switching between p-type and n-type behavior at runtime upon applying different bias …

Concerted wire lifting: Enabling secure and cost-effective split manufacturing

S Patnaik, M Ashraf, H Li, J Knechtel… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this work, we advance the security promise of split manufacturing through judicious
handling of interconnects. First, we study the cost-security tradeoffs underlying for split …

Hardware security for and beyond CMOS technology

J Knechtel - Proceedings of the 2021 International Symposium on …, 2021 - dl.acm.org
As with most aspects of electronic systems and integrated circuits, hardware security has
traditionally evolved around the dominant CMOS technology. However, with the rise of …

Securing hardware through reconfigurable nano-structures

N Kavand, A Darjani, S Rai, A Kumar - Proceedings of the 41st IEEE …, 2022 - dl.acm.org
Hardware security has been an ever-growing concern of the integrated circuit (IC)
designers. Through different stages in the IC design and life cycle, an adversary can extract …

3D integration: Another dimension toward hardware security

J Knechtel, S Patnaik… - 2019 IEEE 25th …, 2019 - ieeexplore.ieee.org
We review threats and selected schemes concerning hardware security at design and
manufacturing time as well as at runtime. We find that 3D integration can serve well to …

Trojan insertion versus layout defenses for modern ICs: Red-versus-blue teaming in a competitive community effort

J Knechtel, M Eslami, P Zou, M Wei… - IACR …, 2025 - moving-the-social.ub.rub.de
Hardware Trojans (HTs) are a longstanding threat to secure computation. Among different
threat models, it is the fabrication-time insertion of additional malicious logic directly into the …

[PDF][PDF] Towards trustworthy computing on untrustworthy hardware

H Salem - 2023 - core.ac.uk
Historically, hardware was thought to be inherently secure and trusted due to its obscurity
and the isolated nature of its design and manufacturing. In the last two decades, however …

Sichere IT ohne Schwachstellen und Hintertüren

A Weber, G Heiser, D Kuhlmann… - TATuP-Zeitschrift für …, 2020 - ssoar.info
Unsere zunehmende Abhängigkeit von Informationstechnik erhöht kontinuierlich die Safety-
und Security-Anforderungen bei deren Einsatz. Ein zentrales Problem hierbei sind …