Results 271 to 280 of about 2,442,732 (352)
Some of the next articles are maybe not open access.
Hardware Security Risks and Threat Analyses in Advanced Manufacturing Industry
ACM Trans. Design Autom. Electr. Syst., 2023The advanced manufacturing industry (AMI) faces many unique challenges from the cyber-physical domain. Security threats are originated from two integral parts: software and hardware. Over the past decade, software security has been addressed extensively,
M. Monjur+2 more
semanticscholar +1 more source
Hardware Security in the Internet of Things: A Survey
ACM Symposium on Cloud Computing, 2023Over the past decades, researchers have paid a lot of attention to hardware security, especially in the Internet of Things (IoT) field. As a result, lots of security approaches have been proposed in the literature to safeguard IoT devices. However, there
Sonia Akter+2 more
semanticscholar +1 more source
Work-in-Progress: HyFlex Hands-On Hardware Security Education During COVID-19
2022 IEEE World Engineering Education Conference (EDUNINE), 2022Practical, hands-on hardware experience is an essential component of computer engineering education. Due to the COVID-19 pandemic, courses with laboratory components such as Computer Logic Design or FPGA Design were subject to interruption from sudden ...
Robert Karam+2 more
semanticscholar +1 more source
Embracing Graph Neural Networks for Hardware Security
2022 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 2022Graph neural networks (GNNs) have attracted increasing attention due to their superior performance in deep learning on graph-structured data. GNNs have succeeded across various domains such as social networks, chemistry, and electronic design automation (
Lilas Alrahis+3 more
semanticscholar +1 more source
New Electronics, 2022
Disclaimer: This set of notes is a work in progress. It may have errors and be missing citations. It is certainly incomplete. Please let the staff know of any errors that you find.
Chongxi Bao+4 more
semanticscholar +1 more source
Disclaimer: This set of notes is a work in progress. It may have errors and be missing citations. It is certainly incomplete. Please let the staff know of any errors that you find.
Chongxi Bao+4 more
semanticscholar +1 more source
Application of 2D Materials in Hardware Security for Internet‐of‐Things: Progress and Perspective
Small Structures, 2022Internet‐of‐Things (IoT) is a ubiquitous network that features a tremendous amount of data and myriads of heterogeneous devices, which are interconnected and accessible or controllable anywhere and anytime.
Heng Xiang+3 more
semanticscholar +1 more source
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2022
Benchmarks are the standards by which technologies can be evaluated and fairly compared. In the field of digital circuits, benchmarks were critical for the development of CAD and FPGA tools decades ago.
Sarah Amir, Domenic Forte
semanticscholar +1 more source
Benchmarks are the standards by which technologies can be evaluated and fairly compared. In the field of digital circuits, benchmarks were critical for the development of CAD and FPGA tools decades ago.
Sarah Amir, Domenic Forte
semanticscholar +1 more source
Hardware Security in Advanced Manufacturing
ACM Great Lakes Symposium on VLSI, 2022More and more digitized techniques and network connectivity are deployed to advanced manufacturing to enable remote system monitoring and automated production; however, this trend also leads to the traditional assumption of security in manufacturing not ...
M. Monjur+3 more
semanticscholar +1 more source
Application of Resistive Random Access Memory in Hardware Security: A Review
Advanced Electronic Materials, 2021Nowadays, advancements in the design of trusted system environments are relying on security provided by hardware‐based primitives, while replacing resource‐hungry software security measures. Emerging nonvolatile memory devices are promising candidates to
Gokulnath Rajendran+3 more
semanticscholar +1 more source
IEEE Circuits and Systems Magazine, 2021
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing hardware-oriented security and trust. However, implementing hardware security primitives and methodologies requires large area overhead and power consumption ...
A. Japa+4 more
semanticscholar +1 more source
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing hardware-oriented security and trust. However, implementing hardware security primitives and methodologies requires large area overhead and power consumption ...
A. Japa+4 more
semanticscholar +1 more source