Results 31 to 40 of about 521,610 (289)
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL
Split manufacturing was introduced as an effective countermeasure against hardware-level threats such as IP piracy, overbuilding, and insertion of hardware Trojans.
Knechtel, Johann +3 more
core +1 more source
Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD [PDF]
Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect ...
DELLI PRISCOLI, Francesco +6 more
core +1 more source
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone +11 more
wiley +1 more source
Register transfer level hardware design information flow modeling and security verification method
Information flow analysis can effectively model the security behavior and security properties of hardware design. However, the existing gate level information flow analysis methods cannot deal with large-scale designs due to computing power and ...
QIN Maoyuan +4 more
doaj +1 more source
Towards Energy-Efficient and Secure Computing Systems
Countermeasures against diverse security threats typically incur noticeable hardware cost and power overhead, which may become the obstacle for those countermeasures to be applicable in energy-efficient computing systems.
Zhiming Zhang, Qiaoyan Yu
doaj +1 more source
On the Security Goals of White-Box Cryptography
We discuss existing and new security notions for white-box cryptography and comment on their suitability for Digital Rights Management and Mobile Payment Applications, the two prevalent use-cases of white-box cryptography.
Estuardo Alpirez Bock +3 more
doaj +1 more source
Joint Control of Radiated and Surface Waves via Space‐Time Coding Metasurfaces
A unified space‐time coding metasurface platform enables simultaneous control of radiated and surface‐confined waves across multiple harmonics. Demonstrated functionalities include multi‐frequency beam shaping; surface‐wave excitation, and hybrid multiplexing.
Zihao Dai +6 more
wiley +1 more source
Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques
Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency.
Thejaswini P +5 more
doaj +1 more source
Spectrally Tunable 2D Material‐Based Infrared Photodetectors for Intelligent Optoelectronics
Intelligent optoelectronics through spectral engineering of 2D material‐based infrared photodetectors. Abstract The evolution of intelligent optoelectronic systems is driven by artificial intelligence (AI). However, their practical realization hinges on the ability to dynamically capture and process optical signals across a broad infrared (IR) spectrum.
Junheon Ha +18 more
wiley +1 more source
This review highlights how machine learning (ML) algorithms are employed to enhance sensor performance, focusing on gas and physical sensors such as haptic and strain devices. By addressing current bottlenecks and enabling simultaneous improvement of multiple metrics, these approaches pave the way toward next‐generation, real‐world sensor applications.
Kichul Lee +17 more
wiley +1 more source

