Healing of DSP Circuits under Power Bound Using Post-Silicon Operand Bitwidth Truncation Read more about Healing of DSP Circuits under Power Bound Using Post-Silicon Operand Bitwidth Truncation
Improving IC Security against Trojan Attacks through Integration of Security Monitors Read more about Improving IC Security against Trojan Attacks through Integration of Security Monitors
Software Exploitable Hardware Trojan Attacks in Embedded Processor Read more about Software Exploitable Hardware Trojan Attacks in Embedded Processor
Protection against Hardware Trojan Attacks: Towards a Comprehensive Solution Read more about Protection against Hardware Trojan Attacks: Towards a Comprehensive Solution
Implantable Ultrasonic Dual Functional Assembly Detection and Treatment of Anomalous Growth Read more about Implantable Ultrasonic Dual Functional Assembly Detection and Treatment of Anomalous Growth
ScanPUF: Robust Ultralow Overhead PUF Using Scan Chain Read more about ScanPUF: Robust Ultralow Overhead PUF Using Scan Chain
Ultralow-Power and Robust Embedded Memory for Bioimplantable Microsystems Read more about Ultralow-Power and Robust Embedded Memory for Bioimplantable Microsystems
Dynamic Cache Tuning for Efficient Memory Based Computing in Multicore Architectures Read more about Dynamic Cache Tuning for Efficient Memory Based Computing in Multicore Architectures
A Wearable Ultrasonic Assembly for Point-Of-Care Autonomous Diagnostics of Malignant Growth Read more about A Wearable Ultrasonic Assembly for Point-Of-Care Autonomous Diagnostics of Malignant Growth
Guest Editors' Introduction: Trusted System with Untrusted Components: An Emerging Design Need Read more about Guest Editors' Introduction: Trusted System with Untrusted Components: An Emerging Design Need