Results 41 to 50 of about 2,442,732 (352)
Register transfer level hardware design information flow modeling and security verification method
Information flow analysis can effectively model the security behavior and security properties of hardware design. However, the existing gate level information flow analysis methods cannot deal with large-scale designs due to computing power and ...
QIN Maoyuan+4 more
doaj +1 more source
A materials and device design concept that comprises a self‐assembled ultra‐thin epitaxial ion‐transporting layer, an amorphous oxide overcoat oxygen‐blocking layer, and a partial filament formed during an electroforming step is proposed for low‐current multilevel resistive switching devices.
Ming Xiao+17 more
wiley +1 more source
Carbon Nanotube 3D Integrated Circuits: From Design to Applications
As Moore's law approaches its physical limits, carbon nanotube (CNT) 3D integrated circuits (ICs) emerge as a promising alternative due to the miniaturization, high mobility, and low power consumption. CNT 3D ICs in optoelectronics, memory, and monolithic ICs are reviewed while addressing challenges in fabrication, design, and integration.
Han‐Yang Liu+3 more
wiley +1 more source
Hardware security and reliability verification based on fault propagation model
Large scale integrate circuits is facing serious threat such as design vulnerabilities, side channels, and hardware Trojans. Traditional functional verification method is difficult to ensure high test coverage, and it is also difficult to detect security
ZHANG Xige+5 more
doaj +1 more source
Graph Similarity and its Applications to Hardware Security
Hardware reverse engineering is a powerful and universal tool for both security engineers and adversaries. From a defensive perspective, it allows for detection of intellectual property infringements and hardware Trojans, while it simultaneously can be ...
Marc Fyrbiak+4 more
semanticscholar +1 more source
Geometric multi‐bit patterning based on dynamic wetting and dewetting phenomena creates roulette‐like Physical Unclonable Function (PUF) labels with stochastic yet deterministic properties. This method leverages the solutal‐Marangoni effect for high randomness while achieving deterministic multinary patterns through polygonal confinement of binary ...
Yeongin Cho+8 more
wiley +1 more source
Proof-Carrying Hardware: Concept and Prototype Tool Flow for Online Verification
Dynamically reconfigurable hardware combines hardware performance with software-like flexibility and finds increasing use in networked systems. The capability to load hardware modules at runtime provides these systems with an unparalleled degree of ...
Stephanie Drzevitzky+2 more
doaj +1 more source
Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance
The growing prevalence of embedded systems in various applications has raised concerns about their vulnerability to malicious code reuse attacks. Current software-based and hardware-assisted security techniques struggle to detect or block these attacks ...
Zhenliang An+4 more
doaj +1 more source
Application of Memristors in Hardware Security: A Current State‐of‐the‐Art Technology
Memristors are widely used in hardware security applications. Research progress in memristor‐based physical unclonable functions (PUFs), random number generators (RNGs), and chaotic circuits is reviewed.
Shiya Lv, Jian Liu, Z. Geng
semanticscholar +1 more source
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana+2 more
wiley +1 more source