Zobrazeno 1 - 10
of 62
pro vyhledávání: '"TAJIK, SHAHIN"'
Driven by a need for ever increasing chip performance and inclusion of innovative features, a growing number of semiconductor companies are opting for all-inclusive System-on-Chip (SoC) architectures. Although Moore's Law has been able to keep up wit
Externí odkaz:
http://arxiv.org/abs/2405.14821
The security of integrated circuits (ICs) can be broken by sophisticated physical attacks relying on failure analysis methods. Optical probing is one of the most prominent examples of such attacks, which can be accomplished in a matter of days, even
Externí odkaz:
http://arxiv.org/abs/2405.03632
Printed circuit boards (PCBs) are an integral part of electronic systems. Hence, verifying their physical integrity in the presence of supply chain attacks (e.g., tampering and counterfeiting) is of utmost importance. Recently, tamper detection techn
Externí odkaz:
http://arxiv.org/abs/2403.12252
Physical side-channel attacks can compromise the security of integrated circuits. Most physical side-channel attacks (e.g., power or electromagnetic) exploit the dynamic behavior of a chip, typically manifesting as changes in current consumption or v
Externí odkaz:
http://arxiv.org/abs/2401.08925
The threats of physical side-channel attacks and their countermeasures have been widely researched. Most physical side-channel attacks rely on the unavoidable influence of computation or storage on current consumption or voltage drop on a chip. Such
Externí odkaz:
http://arxiv.org/abs/2310.07014
The increase in the number of counterfeit and recycled microelectronic chips in recent years has created significant security and safety concerns in various applications. Hence, detecting such counterfeit chips in electronic systems is critical befor
Externí odkaz:
http://arxiv.org/abs/2302.11034
Autor:
Koblah, David Selasi, Acharya, Rabin Yu, Capecci, Daniel, Dizon-Paradis, Olivia P., Tajik, Shahin, Ganji, Fatemeh, Woodard, Damon L., Forte, Domenic
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly used in several fields to improve performance and the level of automation. In recent years, this use has exponentially increased due to the advancement of high-p
Externí odkaz:
http://arxiv.org/abs/2204.09579
The threat of hardware Trojans (HTs) and their detection is a widely studied field. While the effort for inserting a Trojan into an application-specific integrated circuit (ASIC) can be considered relatively high, especially when trusting the chip ma
Externí odkaz:
http://arxiv.org/abs/2107.10147
Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attack
Side-channel and fault injection attacks reveal secret information by monitoring or manipulating the physical effects of computations involving secret variables. Circuit-level countermeasures help to deter these attacks, and traditionally such counte
Externí odkaz:
http://arxiv.org/abs/2106.13784