Design and Validation for FPGA Trust under Hardware Trojan Attacks Read more about Design and Validation for FPGA Trust under Hardware Trojan Attacks
Current based PUF Exploiting Random Variations in SRAM Cells Read more about Current based PUF Exploiting Random Variations in SRAM Cells
An Embedded Memory-Centric Reconfigurable Hardware Accelerator for Security Applications Read more about An Embedded Memory-Centric Reconfigurable Hardware Accelerator for Security Applications
Adaptive ECC for Tailored Protection of Nanoscale Memory Read more about Adaptive ECC for Tailored Protection of Nanoscale Memory
Active protection against PCB physical tampering Read more about Active protection against PCB physical tampering
SACCI: Scan-based Characterization through Clock Phase Sweep for Counterfeit Chip Detection Read more about SACCI: Scan-based Characterization through Clock Phase Sweep for Counterfeit Chip Detection
Robust Nanomechanical Non-Volatile Memory for Computing at Extreme Read more about Robust Nanomechanical Non-Volatile Memory for Computing at Extreme
RESP: A Robust Physical Unclonable Function Retrofitted into Embedded SRAM Array Read more about RESP: A Robust Physical Unclonable Function Retrofitted into Embedded SRAM Array
Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis Read more about Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis
Hardware Trojan Attacks: Threat Analysis and Countermeasures Read more about Hardware Trojan Attacks: Threat Analysis and Countermeasures