Results 21 to 30 of about 1,173,380 (328)
ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes.
M. Sazadur Rahman +5 more
doaj +1 more source
Robust Logic locking for Securing Reusable DSP Cores
A System on Chip (SoC) used in Consumer Electronics (CE) systems integrates a number of reusable Intellectual Property (IP) cores from digital signal processing (DSP), multimedia etc.
Mahendra Rathor, Anirban Sengupta
doaj +1 more source
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL
Split manufacturing was introduced as a countermeasure against hardware-level security threats such as IP piracy, overbuilding, and insertion of hardware Trojans. However, the security promise of split manufacturing has been challenged by various attacks
Abhrajit Sengupta +4 more
doaj +1 more source
Deceptive Logic Locking for Hardware Integrity Protection Against Machine Learning Attacks [PDF]
Logic locking has emerged as a prominent key-driven technique to protect the integrity of integrated circuits. However, novel machine-learning-based attacks have recently been introduced to challenge the security foundations of locking schemes.
Dominik Sisejkovic +3 more
semanticscholar +1 more source
Integrating model checking with HiP-HOPS in model-based safety analysis [PDF]
The ability to perform an effective and robust safety analysis on the design of modern safety–critical systems is crucial. Model-based safety analysis (MBSA) has been introduced in recent years to support the assessment of complex system design by ...
Papadopoulos, Yiannis +1 more
core +1 more source
LIPSTICK: Corruptibility-Aware and Explainable Graph Neural Network-based Oracle-Less Attack on Logic Locking [PDF]
In a zero-trust fabless paradigm, designers are increasingly concerned about hardware-based attacks on the semiconductor supply chain. Logic locking is a design-for-trust method that adds extra key-controlled gates in the circuits to prevent hardware ...
Yeganeh Aghamohammadi, Amin Rezaei
semanticscholar +1 more source
CAC 2.0: A Corrupt and Correct Logic Locking Technique Resilient to Structural Analysis Attacks [PDF]
Logic locking proposed to protect integrated circuits from serious hardware threats has been studied extensively over a decade. In these years, many logic locking techniques have been proven to be broken.
Levent Aksoy +2 more
semanticscholar +1 more source
Regenerative Braking Logic That Maximizes Energy Recovery Ensuring the Vehicle Stability
This paper presents a regenerative braking logic that aims to maximize the recovery of energy during braking without compromising the stability of the vehicle. This model of regenerative braking ensures that the regenerative torque of the electric motor (
Giulia Sandrini +2 more
doaj +1 more source
The potential of programmable logic in the middle: cache bleaching [PDF]
Consolidating hard real-time systems onto modern multi-core Systems-on-Chip (SoC) is an open challenge. The extensive sharing of hardware resources at the memory hierarchy raises important unpredictability concerns.
Mancuso, Renato, Roozkhosh, Shahin
core +1 more source
To reduce the cost of ICs and to meet the market's demand, a considerable portion of manufacturing supply chain, including silicon fabrication, packaging and testing may be pushed offshore. Utilizing a global IC manufacturing supply chain, and inclusion of non-trusted parties in the supply chain has raised concerns over security and trust related ...
Azar, Kimia Zamiri +3 more
openaire +2 more sources

