-
1
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01Subjects: Get full text
Article -
2
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer
Published 2024-01-01“…However, traditional HTs protection techniques cannot guarantee complete protection against HTs, which poses a great challenge to the hardware security of SoW. In this paper, we propose a computing architecture based on endogenous security theory—dynamic heterogeneous redundant computing architecture (DHRCA) that can tolerate and detect HTs at runtime. …”
Get full text
Article -
3
MARPUF: physical unclonable function with improved machine learning attack resistance
Published 2021-08-01“…Although PUF is very useful in the area of hardware security, it is vulnerable to machine learning modelling attacks (ML‐MA) by modelling the challenge‐response pairs (CRPs) behaviour. …”
Get full text
Article -
4
Analysis and Improvement of a Robust User Authentication Framework for Ubiquitous Sensor Networks
Published 2014-03-01“…Another is using the Hardware Security Module. After a simple analysis, we have proved that the improved scheme can resist the collusion attack.…”
Get full text
Article -
5
A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things
Published 2019-12-01“…With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things. …”
Get full text
Article -
6
Framework to analyze and exploit the smart home IoT firmware
Published 2025-02-01“…Since operating system (OS) and hardware security have improved recently, researchers and hackers now seek vulnerabilities in other areas, such as firmware. …”
Get full text
Article -
7
TVD‐PB logic circuit based on camouflaging circuit for IoT security
Published 2022-01-01“…A logic camouflaging circuit is proposed that uses a balanced power consumption and threshold voltage‐defined technique to provide an antiphysical attack scheme to protect the hardware security for IoT devices. The proposed circuit uses a symmetric differential pull‐down network in implementing the different logic functions through the threshold voltage reconfiguration circuit. …”
Get full text
Article