Zobrazeno 1 - 10
of 108
pro vyhledávání: '"OpenSPARC"'
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 41:35-48
Anti-virus software (AVS) tools are used to detect Malware in a system. However, AVS are vulnerable to attacks. A malicious entity can exploit these vulnerabilities to subvert the AVS. Recently, hardware components like Hardware Performance Counters
Autor:
Niraj K. Jha, Abdullah Guler
Publikováno v:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 28:2146-2156
Three-dimensional integrated circuits (3-D ICs) have the potential to push Moore’s law further by accommodating more transistors per unit footprint area along with a reduction in power consumption, interconnect length, and the number of repeaters.
Publikováno v:
IEEE Transactions on Applied Superconductivity. 30:1-13
Integrated circuit (IC) camouflaging is a defense to defeat image-based reverse engineering. The security of CMOS ICs has been extensively studied and camouflage techniques have been developed. A camouflaging method is introduced here to protect supe
Autor:
Sharad Malik, Burcin Cakir
Publikováno v:
ACM Transactions on Design Automation of Electronic Systems. 24:1-19
Contemporary integrated circuits (ICs) are increasingly being constructed using intellectual property blocks (IPs) obtained from third parties in a globalized supply chain. The increased vulnerability to adversarial changes during this untrusted supp
Publikováno v:
ACM Transactions on Design Automation of Electronic Systems. 24:1-19
Design-for-manufacturability (DFM) guidelines are recommended layout design practices intended to capture layout features that are difficult to manufacture correctly. Avoiding such features prevents the occurrence of potential systematic defects. Lay
Publikováno v:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 27:700-710
In the typical application-specified integrated circuit (ASIC) design flow, reliability-driven performance loss is computed, in part, with switching activity files. However, for ASIC designs of multicore processors, the typical switching activity fil
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 38:149-162
Security is now becoming a well-established challenge for integrated circuits (ICs). Various types of IC attacks have been reported, including reverse engineering IPs, dumping on-chip data, and controlling/modifying IC operation. IEEE 1149.1, commonl
Autor:
Krishnendu Chakrabarty
Publikováno v:
VLSI-DAT
There has been a growing trend in recent years to outsource various aspects of the semiconductor design and manufacturing flow to different parties spread across the globe. Such outsourcing increases the risk of adversaries adding malicious logic, re
Autor:
Abdullah Guler, Niraj K. Jha
Publikováno v:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 26:1868-1880
With continued technology scaling, interconnects have become the bottleneck in further performance and power consumption improvements in modern microprocessors. 3-D integrated circuits (3-D ICs) provide a promising approach for alleviating this bottl
Autor:
Burcin Cakir, Sharad Malik
Publikováno v:
ACM Transactions on Design Automation of Electronic Systems. 23:1-19
Outsourcing of design and manufacturing processes makes integrated circuits (ICs) vulnerable to adversarial changes and raises concerns about their integrity. Reverse engineering the manufactured netlist helps identify malicious insertions. In this a