-
1
-
2
Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort
Published 2024-12-01Subjects: “…Hardware Security…”
Get full text
Article -
3
Hardware/Software Implementation of a Chip-to-Chip Communication Protocol Based on SPDM
Published 2024-01-01Subjects: Get full text
Article -
4
Design and detection of hardware Trojan based on satisfiability don't cares
Published 2021-04-01Subjects: “…hardware security…”
Get full text
Article -
5
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01Subjects: Get full text
Article -
6
Secure interface architecture for the software defined system on wafer
Published 2024-10-01Subjects: Get full text
Article -
7
PreSCAN: A Comprehensive Review of Pre-Silicon Physical Side-Channel Vulnerability Assessment Methodologies
Published 2024-10-01Subjects: “…hardware security…”
Get full text
Article