Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities beneath Software
Due to the increasing size and complexity of system-on-chips (SoCs), new threats and
vulnerabilities are emerging, mainly related to flaws at the system level. Due to the lack of …
vulnerabilities are emerging, mainly related to flaws at the system level. Due to the lack of …
Secure high-level synthesis: Challenges and solutions
High-level synthesis (HLS) has significantly reduced time and complexity of the hardware
design by raising the abstraction to high-level languages (HLL) like C/C++. HLS has allowed …
design by raising the abstraction to high-level languages (HLL) like C/C++. HLS has allowed …
FPGA Bitstream Modification: Attacks and Countermeasures
M Moraitis - IEEE Access, 2023 - ieeexplore.ieee.org
Advances in Field-Programmable Gate Array (FPGA) technology in recent years have
resulted in an expansion of its usage in a very wide spectrum of applications. Apart from …
resulted in an expansion of its usage in a very wide spectrum of applications. Apart from …
CAD tools pathway in hardware security
In modern computer devices, System-on-Chip (SoC) technology is used to design hardware
components. The most sensitive assets of a SoC design are the encryption key …
components. The most sensitive assets of a SoC design are the encryption key …
Re-Pen: Reinforcement Learning-Enforced Penetration Testing for SoC Security Verification
Due to the increasingly complex interaction between the tightly integrated components,
reuse of various untrustworthy third-party IPs (3PIPs), and security-unaware design …
reuse of various untrustworthy third-party IPs (3PIPs), and security-unaware design …
Locking Your IP: A Step-by-Step Guide
Logic locking technology has gained significant attention in the field of hardware security
due to its effectiveness in protecting integrated circuits from unauthorized access and …
due to its effectiveness in protecting integrated circuits from unauthorized access and …
ML-Assisted Side Channel Security Approaches for Hardware Trojan Detection and PUF Modeling Attacks
NP Bhatta - 2024 - rave.ohiolink.edu
Hardware components are becoming prone to threats with increasing technological
advances. Malicious modifications to such components are increasing and are known as …
advances. Malicious modifications to such components are increasing and are known as …