A primer on hardware security: Models, methods, and metrics
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …
Techniques for design and implementation of secure reconfigurable PUFs
Physically unclonable functions (PUFs) provide a basis for many security and digital rights
management protocols. PUF-based security approaches have numerous comparative …
management protocols. PUF-based security approaches have numerous comparative …
Provably secure active IC metering techniques for piracy avoidance and digital rights management
F Koushanfar - IEEE Transactions on Information Forensics …, 2011 - ieeexplore.ieee.org
In the horizontal semiconductor business model where the designer's intellectual property
(IP) is transparent to foundry and to other entities on the production chain, integrated circuits …
(IP) is transparent to foundry and to other entities on the production chain, integrated circuits …
Testing techniques for hardware security
System security has emerged as a premier design requirement. While there has been an
enormous body of impressive work on testing integrated circuits (ICs) desiderata such as …
enormous body of impressive work on testing integrated circuits (ICs) desiderata such as …
Hardware security: Threat models and metrics
The globalized semiconductor supply chain is vulnerable to hardware attacks including:
Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs) …
Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs) …
Security based on physical unclonability and disorder
Identification, authentication, and integrity checking are important tasks for ensuring the
security and protection of valuable objects, devices, programs, and data. The utilization of …
security and protection of valuable objects, devices, programs, and data. The utilization of …
Integrated circuits metering for piracy protection and digital rights management: An overview
F Koushanfar - Proceedings of the 21st edition of the great lakes …, 2011 - dl.acm.org
This paper presents an overview of hardware and Integrated Circuits (IC) metering methods.
IC metering or hardware metering refers to tools, methodologies, and protocols that enable …
IC metering or hardware metering refers to tools, methodologies, and protocols that enable …
Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges
The field of microelectronics has experienced extensive integration into various aspects of
our everyday lives, evident via its utilization across a wide range of devices such as …
our everyday lives, evident via its utilization across a wide range of devices such as …
A unified framework for multimodal submodular integrated circuits trojan detection
This paper presents a unified formal framework for integrated circuits (ICs) Trojan detection
that can simultaneously employ multiple noninvasive side-channel measurement types …
that can simultaneously employ multiple noninvasive side-channel measurement types …
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for
secure activation, IC authentication and for other important applications including encryption …
secure activation, IC authentication and for other important applications including encryption …