Results 271 to 280 of about 2,442,732 (352)
Some of the next articles are maybe not open access.

Hardware Security Risks and Threat Analyses in Advanced Manufacturing Industry

ACM Trans. Design Autom. Electr. Syst., 2023
The advanced manufacturing industry (AMI) faces many unique challenges from the cyber-physical domain. Security threats are originated from two integral parts: software and hardware. Over the past decade, software security has been addressed extensively,
M. Monjur   +2 more
semanticscholar   +1 more source

Hardware Security in the Internet of Things: A Survey

ACM Symposium on Cloud Computing, 2023
Over the past decades, researchers have paid a lot of attention to hardware security, especially in the Internet of Things (IoT) field. As a result, lots of security approaches have been proposed in the literature to safeguard IoT devices. However, there
Sonia Akter   +2 more
semanticscholar   +1 more source

Work-in-Progress: HyFlex Hands-On Hardware Security Education During COVID-19

2022 IEEE World Engineering Education Conference (EDUNINE), 2022
Practical, hands-on hardware experience is an essential component of computer engineering education. Due to the COVID-19 pandemic, courses with laboratory components such as Computer Logic Design or FPGA Design were subject to interruption from sudden ...
Robert Karam   +2 more
semanticscholar   +1 more source

Embracing Graph Neural Networks for Hardware Security

2022 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 2022
Graph neural networks (GNNs) have attracted increasing attention due to their superior performance in deep learning on graph-structured data. GNNs have succeeded across various domains such as social networks, chemistry, and electronic design automation (
Lilas Alrahis   +3 more
semanticscholar   +1 more source

Hardware Security

New Electronics, 2022
Disclaimer: This set of notes is a work in progress. It may have errors and be missing citations. It is certainly incomplete. Please let the staff know of any errors that you find.
Chongxi Bao   +4 more
semanticscholar   +1 more source

Application of 2D Materials in Hardware Security for Internet‐of‐Things: Progress and Perspective

Small Structures, 2022
Internet‐of‐Things (IoT) is a ubiquitous network that features a tremendous amount of data and myriads of heterogeneous devices, which are interconnected and accessible or controllable anywhere and anytime.
Heng Xiang   +3 more
semanticscholar   +1 more source

EigenCircuit: Divergent Synthetic Benchmark Generation for Hardware Security Using PCA and Linear Programming

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2022
Benchmarks are the standards by which technologies can be evaluated and fairly compared. In the field of digital circuits, benchmarks were critical for the development of CAD and FPGA tools decades ago.
Sarah Amir, Domenic Forte
semanticscholar   +1 more source

Hardware Security in Advanced Manufacturing

ACM Great Lakes Symposium on VLSI, 2022
More and more digitized techniques and network connectivity are deployed to advanced manufacturing to enable remote system monitoring and automated production; however, this trend also leads to the traditional assumption of security in manufacturing not ...
M. Monjur   +3 more
semanticscholar   +1 more source

Application of Resistive Random Access Memory in Hardware Security: A Review

Advanced Electronic Materials, 2021
Nowadays, advancements in the design of trusted system environments are relying on security provided by hardware‐based primitives, while replacing resource‐hungry software security measures. Emerging nonvolatile memory devices are promising candidates to
Gokulnath Rajendran   +3 more
semanticscholar   +1 more source

Hardware Security Exploiting Post-CMOS Devices: Fundamental Device Characteristics, State-of-the-Art Countermeasures, Challenges and Roadmap

IEEE Circuits and Systems Magazine, 2021
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing hardware-oriented security and trust. However, implementing hardware security primitives and methodologies requires large area overhead and power consumption ...
A. Japa   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy