Results 41 to 50 of about 2,442,732 (352)

Register transfer level hardware design information flow modeling and security verification method

open access: yesXibei Gongye Daxue Xuebao
Information flow analysis can effectively model the security behavior and security properties of hardware design. However, the existing gate level information flow analysis methods cannot deal with large-scale designs due to computing power and ...
QIN Maoyuan   +4 more
doaj   +1 more source

Ultra‐Fast Non‐Volatile Resistive Switching Devices with Over 512 Distinct and Stable Levels for Memory and Neuromorphic Computing

open access: yesAdvanced Functional Materials, EarlyView.
A materials and device design concept that comprises a self‐assembled ultra‐thin epitaxial ion‐transporting layer, an amorphous oxide overcoat oxygen‐blocking layer, and a partial filament formed during an electroforming step is proposed for low‐current multilevel resistive switching devices.
Ming Xiao   +17 more
wiley   +1 more source

Carbon Nanotube 3D Integrated Circuits: From Design to Applications

open access: yesAdvanced Functional Materials, EarlyView.
As Moore's law approaches its physical limits, carbon nanotube (CNT) 3D integrated circuits (ICs) emerge as a promising alternative due to the miniaturization, high mobility, and low power consumption. CNT 3D ICs in optoelectronics, memory, and monolithic ICs are reviewed while addressing challenges in fabrication, design, and integration.
Han‐Yang Liu   +3 more
wiley   +1 more source

Hardware security and reliability verification based on fault propagation model

open access: yesXibei Gongye Daxue Xuebao
Large scale integrate circuits is facing serious threat such as design vulnerabilities, side channels, and hardware Trojans. Traditional functional verification method is difficult to ensure high test coverage, and it is also difficult to detect security
ZHANG Xige   +5 more
doaj   +1 more source

Graph Similarity and its Applications to Hardware Security

open access: yesIEEE transactions on computers, 2020
Hardware reverse engineering is a powerful and universal tool for both security engineers and adversaries. From a defensive perspective, it allows for detection of intellectual property infringements and hardware Trojans, while it simultaneously can be ...
Marc Fyrbiak   +4 more
semanticscholar   +1 more source

Roulette‐Inspired Physical Unclonable Functions: Stochastic yet Deterministic Multi‐Bit Patterning through the Solutal Marangoni Effect

open access: yesAdvanced Functional Materials, EarlyView.
Geometric multi‐bit patterning based on dynamic wetting and dewetting phenomena creates roulette‐like Physical Unclonable Function (PUF) labels with stochastic yet deterministic properties. This method leverages the solutal‐Marangoni effect for high randomness while achieving deterministic multinary patterns through polygonal confinement of binary ...
Yeongin Cho   +8 more
wiley   +1 more source

Proof-Carrying Hardware: Concept and Prototype Tool Flow for Online Verification

open access: yesInternational Journal of Reconfigurable Computing, 2010
Dynamically reconfigurable hardware combines hardware performance with software-like flexibility and finds increasing use in networked systems. The capability to load hardware modules at runtime provides these systems with an unparalleled degree of ...
Stephanie Drzevitzky   +2 more
doaj   +1 more source

Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance

open access: yesMicromachines, 2023
The growing prevalence of embedded systems in various applications has raised concerns about their vulnerability to malicious code reuse attacks. Current software-based and hardware-assisted security techniques struggle to detect or block these attacks ...
Zhenliang An   +4 more
doaj   +1 more source

Application of Memristors in Hardware Security: A Current State‐of‐the‐Art Technology

open access: yesAdvanced Intelligent Systems, 2020
Memristors are widely used in hardware security applications. Research progress in memristor‐based physical unclonable functions (PUFs), random number generators (RNGs), and chaotic circuits is reviewed.
Shiya Lv, Jian Liu, Z. Geng
semanticscholar   +1 more source

3D (Bio) Printing Combined Fiber Fabrication Methods for Tissue Engineering Applications: Possibilities and Limitations

open access: yesAdvanced Functional Materials, EarlyView.
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy