SMA: A System-Level Mutual Authentication for Protecting Electronic Hardware and Firmware Read more about SMA: A System-Level Mutual Authentication for Protecting Electronic Hardware and Firmware
Security Primitive Design with Nanoscale Devices: A Case Study with Resistive RAM Read more about Security Primitive Design with Nanoscale Devices: A Case Study with Resistive RAM
Real-time, autonomous bladder event classification and closed-loop control from single-channel pressure data Read more about Real-time, autonomous bladder event classification and closed-loop control from single-channel pressure data
On detecting delay anomalies introduced by hardware trojans Read more about On detecting delay anomalies introduced by hardware trojans
MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection Read more about MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection
JTAG-based robust PCB authentication for protection against counterfeiting attacks Read more about JTAG-based robust PCB authentication for protection against counterfeiting attacks
Hardware Trojans: Lessons Learned after One Decade of Research Read more about Hardware Trojans: Lessons Learned after One Decade of Research
Exploiting design-for-debug for flexible SoC security architecture Read more about Exploiting design-for-debug for flexible SoC security architecture
ENFIRE: An Energy-efficient Fine-grained Spatio-temporal Reconfigurable Computing Fabric (Abstact Only) Read more about ENFIRE: An Energy-efficient Fine-grained Spatio-temporal Reconfigurable Computing Fabric (Abstact Only)