Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Reimann, Lennart M."'
Autor:
Reimann, Lennart M., Variyar, Yadu Madhukumar, Huelser, Lennet, Ghinami, Chiara, Germek, Dominik, Leupers, Rainer
The MiG-V was designed for high-security applications and is the first commercially available logic-locked RISC-V processor on the market. In this context logic locking was used to protect the RISC-V processor design during the untrusted manufacturin
Externí odkaz:
http://arxiv.org/abs/2408.04976
Autor:
Reimann, Lennart M., Prashar, Anshul, Ghinami, Chiara, Pelke, Rebecca, Sisejkovic, Dominik, Merchant, Farhad, Leupers, Rainer
In contemporary Electronic Design Automation (EDA) tools, security often takes a backseat to the primary goals of power, performance, and area optimization. Commonly, the security analysis is conducted by hand, leading to vulnerabilities in the desig
Externí odkaz:
http://arxiv.org/abs/2401.17819
Autor:
Reimann, Lennart M., Wiesner, Jonathan, Sisejkovic, Dominik, Merchant, Farhad, Leupers, Rainer
Despite its ever-increasing impact, security is not considered as a design objective in commercial electronic design automation (EDA) tools. This results in vulnerabilities being overlooked during the software-hardware design process. Specifically, v
Externí odkaz:
http://arxiv.org/abs/2308.02694
Novel non-volatile memory (NVM) technologies offer high-speed and high-density data storage. In addition, they overcome the von Neumann bottleneck by enabling computing-in-memory (CIM). Various computer architectures have been proposed to integrate C
Externí odkaz:
http://arxiv.org/abs/2304.05682
Security still remains an afterthought in modern Electronic Design Automation (EDA) tools, which solely focus on enhancing performance and reducing the chip size. Typically, the security analysis is conducted by hand, leading to vulnerabilities in th
Externí odkaz:
http://arxiv.org/abs/2211.16891
Publikováno v:
2021 IEEE 39th International Conference on Computer Design (ICCD)
The enormous amount of code required to design modern hardware implementations often leads to critical vulnerabilities being overlooked. Especially vulnerabilities that compromise the confidentiality of sensitive data, such as cryptographic keys, hav
Externí odkaz:
http://arxiv.org/abs/2109.02379
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), July, 2021
Logic locking has emerged as a prominent key-driven technique to protect the integrity of integrated circuits. However, novel machine-learning-based attacks have recently been introduced to challenge the security foundations of locking schemes. These
Externí odkaz:
http://arxiv.org/abs/2107.08695
Autor:
Sisejkovic, Dominik, Reimann, Lennart M., Moussavi, Elmira, Merchant, Farhad, Leupers, Rainer
Publikováno v:
2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)
In the past decade, a lot of progress has been made in the design and evaluation of logic locking; a premier technique to safeguard the integrity of integrated circuits throughout the electronics supply chain. However, the widespread proliferation of
Externí odkaz:
http://arxiv.org/abs/2107.01915
Autor:
Merchant, Farhad, Sisejkovic, Dominik, Reimann, Lennart M., Yasotharan, Kirthihan, Grass, Thomas, Leupers, Rainer
With the growing demands of consumer electronic products, the computational requirements are increasing exponentially. Due to the applications' computational needs, the computer architects are trying to pack as many cores as possible on a single die
Externí odkaz:
http://arxiv.org/abs/2101.05591
Autor:
Sisejkovic, Dominik, Merchant, Farhad, Reimann, Lennart M., Srivastava, Harshit, Hallawa, Ahmed, Leupers, Rainer
Publikováno v:
ACM J. Emerg. Technol. Comput. Syst. 17, 3, Article 30 (May 2021), 26 pages
Logic locking is a prominent technique to protect the integrity of hardware designs throughout the integrated circuit design and fabrication flow. However, in recent years, the security of locking schemes has been thoroughly challenged by the introdu
Externí odkaz:
http://arxiv.org/abs/2011.10389