Loading…
Loading…
Loading…
Loading…
Loading…
Digitally Assisted Mixed-Signal Circuit Security
Leonhard, Julian, Limaye, Nimisha, Turk, Shadi, Sayed, Alhassan, Rizo, Alan Rodrigo Diaz, Aboushady, Hassan, Sinanoglu, Ozgur, Stratigopoulos, Haralampos-G.
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01.08.2022)
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01.08.2022)
Get full text
Journal Article
Loading…
Loading…
Echo TEMPEST: EM Information Leakage Induced by IEMI for Electronic Devices
Kaji, Shugo, Fujimoto, Daisuke, Kinugawa, Masahiro, Hayashi, Yuichi
Published in IEEE transactions on electromagnetic compatibility (01.06.2023)
Published in IEEE transactions on electromagnetic compatibility (01.06.2023)
Get full text
Journal Article
Loading…
Generalized SAT-Attack-Resistant Logic Locking
Zhou, Jingbo, Zhang, Xinmiao
Published in IEEE transactions on information forensics and security (2021)
Published in IEEE transactions on information forensics and security (2021)
Get full text
Journal Article
Loading…
Work-in-Progress: HyFlex Hands-On Hardware Security Education During COVID-19
Karam, Robert A., Katkoori, Srinivas, Kermani, Mehran Mozaffari
Published in 2022 IEEE World Engineering Education Conference (EDUNINE) (13.03.2022)
Published in 2022 IEEE World Engineering Education Conference (EDUNINE) (13.03.2022)
Get full text
Conference Proceeding
Loading…
GNNUnlock+: A Systematic Methodology for Designing Graph Neural Networks-Based Oracle-Less Unlocking Schemes for Provably Secure Logic Locking
Alrahis, Lilas, Patnaik, Satwik, Hanif, Muhammad Abdullah, Saleh, Hani, Shafique, Muhammad, Sinanoglu, Ozgur
Published in IEEE transactions on emerging topics in computing (01.07.2022)
Published in IEEE transactions on emerging topics in computing (01.07.2022)
Get full text
Journal Article
Loading…
CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems
Barredo, Jorge, Eceiza, Maialen, Flores, Jose Luis, Iturbe, Mikel
Published in International journal of information security (01.08.2025)
Published in International journal of information security (01.08.2025)
Get full text
Journal Article
Loading…
IC security and quality improvement by protection of chip backside against hardware attacks
Amini, E., Beyreuther, A., Herfurth, N., Steigert, A., Muydinov, R., Szyszka, B., Boit, C.
Published in Microelectronics and reliability (01.09.2018)
Published in Microelectronics and reliability (01.09.2018)
Get full text
Journal Article
Loading…
Physics inspired compact modelling of BiFeO$_3$ based memristors for hardware security applications
Yarragolla, Sahitya, Du, Nan, Hemke, Torben, Zhao, Xianyue, Chen, Ziang, Polian, Ilia, Mussenbrock, Thomas
Year of Publication 07.10.2022
Year of Publication 07.10.2022
Get full text
Journal Article
Loading…
Loading…
Contract Awarded For Extension Of The System For Storing Cryptographic Keys the Subject Of The Public Contract Is To Expand The Existing Hsm Solution (hsm - Hardware Security Module), Where Existing Hsm Buyers Uses As A Qscd (qscd (qscd) Certificate Stora
Published in MENA Report
(18.04.2025)
Get full text
Newsletter
Loading…
An Innovative Strategy Based on Secure Element for Cyber–Physical Authentication in Safety-Critical Manufacturing Supply Chain
Gómez-Marín, Ernesto, Senni, Valerio, Parrilla, Luis, Tejero López, Jose L., Castillo, Encarnación, Martintoni, Davide
Published in Applied sciences (01.09.2023)
Published in Applied sciences (01.09.2023)
Get full text
Journal Article
Loading…
Logic locking emulator on FPGA: A conceptual view
Chellam, Manjith Baby Sarojam, Natarajan, Ramasubramanian, Naganathan, Nagi
Published in VLSI design (06.01.2024)
Published in VLSI design (06.01.2024)
Get full text
Conference Proceeding
Loading…
Loading…
Covert Timing Channels Exploiting Cache Coherence Hardware: Characterization and Defense
Yao, Fan, Doroslovački, Miloš, Venkataramani, Guru
Published in International journal of parallel programming (01.08.2019)
Published in International journal of parallel programming (01.08.2019)
Get full text
Journal Article