Hardware Reverse Engineering (HRE) is a technique for analyzing Integrat...
Backdoors pose a serious threat to machine learning, as they can comprom...
Channel Reciprocity-based Key Generation (CRKG) exploits reciprocal chan...
The increasing opaqueness of AI and its growing influence on our digital...
Today, we use smartphones as multi-purpose devices that communicate with...
Physical layer key generation (PKG) is a promising means to provide
on-t...
A whole range of attacks becomes possible when adversaries gain physical...
Modern hardware systems are composed of a variety of third-party Intelle...
Wireless radio channels are known to contain information about the
surro...
The intelligent reflecting surface (IRS) is a promising new paradigm in
...
Understanding the internals of Integrated Circuits (ICs), referred to as...
Embedded systems are ubiquitous. However, physical access of users and
l...
The security of FPGAs is a crucial topic, as any vulnerability within th...
For classical fault analysis, a transient fault is required to be inject...
In this paper, we investigate physical-layer security (PLS) methods for
...
Physical layer key generation is a promising candidate for cryptographic...
Microcode is an abstraction layer used by modern x86 processors that
int...
The threat of hardware reverse engineering is a growing concern for a la...
As part of the revelations about the NSA activities, the notion of
inter...
Microcode is an abstraction layer on top of the physical components of a...
Opaque predicates are a well-established fundamental building block for
...
The threat of inserting hardware Trojans during the design, production, ...
Since hardware oftentimes serves as the root of trust in our modern
inte...
In contrast to software reverse engineering, there are hardly any tools
...
Since underlying hardware components form the basis of trust in virtuall...
Hardware reverse engineering is a universal tool for both legitimate and...
A massive threat to the modern and complex IC production chain is the us...
Hardware Trojans have drawn the attention of academia, industry and
gove...
True random number generators (TRNGs) are essential components of
crypto...
Gate camouflaging is a known security enhancement technique that tries t...