Oracle-less machine learning (ML) attacks have broken various logic lock...
We propose TrojanSAINT, a graph neural network (GNN)-based hardware Troj...
Graph neural networks (GNNs) have pushed the state-of-the-art (SOTA) for...
Power side-channel (PSC) attacks are well-known threats to sensitive har...
Due to cost benefits, supply chains of integrated circuits (ICs) are lar...
As industry moves toward chiplet-based designs, the insertion of hardwar...
Process variations and device aging impose profound challenges for circu...
Industry is moving towards large-scale system-on-chip (SoC) designs wher...
Logic locking aims to protect the intellectual property (IP) of integrat...
Dedicated, after acceptance and publication, in memory of the late Vasso...
Side-channel attacks have empowered bypassing of cryptographic component...
Modern electronic systems become evermore complex, yet remain modular, w...
As with most aspects of electronic systems and integrated circuits, hard...
Split manufacturing (SM) and layout camouflaging (LC) are two promising
...
We review threats and selected schemes concerning hardware security at d...
Leveraging 2.5D interposer technology, we advocate the integration of
un...
Protecting intellectual property (IP) has become a serious challenge for...
Split manufacturing was introduced as an effective countermeasure agains...
The increasing cost of integrated circuit (IC) fabrication has driven mo...
With the globalization of manufacturing and supply chains, ensuring the
...
Hardware-centric security threats have emerged in every stage of the IC
...
Split manufacturing (SM) seeks to protect against piracy of intellectual...
Protecting intellectual property (IP) in electronic circuits has become ...
Here we advance the protection of split manufacturing (SM)-based layouts...
Layout camouflaging (LC) is a promising technique to protect chip design...