A primer on hardware security: Models, methods, and metrics

M Rostami, F Koushanfar, R Karri - Proceedings of the IEEE, 2014 - ieeexplore.ieee.org
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …

Techniques for design and implementation of secure reconfigurable PUFs

M Majzoobi, F Koushanfar, M Potkonjak - ACM Transactions on …, 2009 - dl.acm.org
Physically unclonable functions (PUFs) provide a basis for many security and digital rights
management protocols. PUF-based security approaches have numerous comparative …

Provably secure active IC metering techniques for piracy avoidance and digital rights management

F Koushanfar - IEEE Transactions on Information Forensics …, 2011 - ieeexplore.ieee.org
In the horizontal semiconductor business model where the designer's intellectual property
(IP) is transparent to foundry and to other entities on the production chain, integrated circuits …

Testing techniques for hardware security

M Majzoobi, F Koushanfar… - 2008 IEEE International …, 2008 - ieeexplore.ieee.org
System security has emerged as a premier design requirement. While there has been an
enormous body of impressive work on testing integrated circuits (ICs) desiderata such as …

Hardware security: Threat models and metrics

M Rostami, F Koushanfar… - 2013 IEEE/ACM …, 2013 - ieeexplore.ieee.org
The globalized semiconductor supply chain is vulnerable to hardware attacks including:
Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs) …

Security based on physical unclonability and disorder

U Rührmair, S Devadas, F Koushanfar - Introduction to Hardware Security …, 2011 - Springer
Identification, authentication, and integrity checking are important tasks for ensuring the
security and protection of valuable objects, devices, programs, and data. The utilization of …

Integrated circuits metering for piracy protection and digital rights management: An overview

F Koushanfar - Proceedings of the 21st edition of the great lakes …, 2011 - dl.acm.org
This paper presents an overview of hardware and Integrated Circuits (IC) metering methods.
IC metering or hardware metering refers to tools, methodologies, and protocols that enable …

Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges

K Nyako, S Devkota, F Li, V Borra - Electronics, 2023 - mdpi.com
The field of microelectronics has experienced extensive integration into various aspects of
our everyday lives, evident via its utilization across a wide range of devices such as …

A unified framework for multimodal submodular integrated circuits trojan detection

F Koushanfar, A Mirhoseini - IEEE Transactions on Information …, 2010 - ieeexplore.ieee.org
This paper presents a unified formal framework for integrated circuits (ICs) Trojan detection
that can simultaneously employ multiple noninvasive side-channel measurement types …

A physical unclonable function defined using power distribution system equivalent resistance variations

R Helinski, D Acharyya, J Plusquellic - Proceedings of the 46th Annual …, 2009 - dl.acm.org
For hardware security applications, the availability of secret keys is a critical component for
secure activation, IC authentication and for other important applications including encryption …