Results 11 to 20 of about 63,047 (284)
A Security Analysis of Circuit Clock Obfuscation
Key-based circuit obfuscation or logic-locking is a technique that can be used to hide the full design of an integrated circuit from an untrusted foundry or end-user. The technique is based on creating ambiguity in the original circuit by inserting “key”
Rajesh Datta +3 more
doaj +1 more source
Noise‐based logic locking scheme against signal probability skew analysis
Due to integrated circuit (IC) production chain globalisation, several new threats such as hardware trojans, counterfeiting and overproduction are threatening the IC industry. So logic locking is deployed to hinder these security threats.
Ahmad Rezaei, Ali Mahani
doaj +1 more source
Logic Locking Using Emerging 2T/3T Magnetic Tunnel Junctions for Hardware Security
With the advancement of beyond CMOS devices, a new approach to utilize the inherent physics of such emerging structures for various applications is of great interest in recent research.
Divyanshu Divyanshu +4 more
doaj +1 more source
Modelling earthquake rates and associated uncertainties in the Marmara Region, Turkey [PDF]
Modelling the seismic potential of active faults and the associated epistemic uncertainty is a fundamental step of probabilistic seismic hazard assessment (PSHA).
T. Chartier +7 more
doaj +1 more source
ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes.
M. Sazadur Rahman +5 more
doaj +1 more source
Robust Logic locking for Securing Reusable DSP Cores
A System on Chip (SoC) used in Consumer Electronics (CE) systems integrates a number of reusable Intellectual Property (IP) cores from digital signal processing (DSP), multimedia etc.
Mahendra Rathor, Anirban Sengupta
doaj +1 more source
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL
Split manufacturing was introduced as a countermeasure against hardware-level security threats such as IP piracy, overbuilding, and insertion of hardware Trojans. However, the security promise of split manufacturing has been challenged by various attacks
Abhrajit Sengupta +4 more
doaj +1 more source
Energy-efficient and high-performance lock speculation hardware for embedded multicore systems [PDF]
Embedded systems are becoming increasingly common in everyday life and like their general-purpose counterparts, they have shifted towards shared memory multicore architectures.
Bahar, R Iris +4 more
core +1 more source
Regenerative Braking Logic That Maximizes Energy Recovery Ensuring the Vehicle Stability
This paper presents a regenerative braking logic that aims to maximize the recovery of energy during braking without compromising the stability of the vehicle. This model of regenerative braking ensures that the regenerative torque of the electric motor (
Giulia Sandrini +2 more
doaj +1 more source
Preemptive Software Transactional Memory [PDF]
In state-of-the-art Software Transactional Memory (STM) systems, threads carry out the execution of transactions as non-interruptible tasks. Hence, a thread can react to the injection of a higher priority transactional task and take care of its ...
DI SANZO, Pierangelo +4 more
core +1 more source

