Resilient System-on-Chip Designs With NoC Fabrics Read more about Resilient System-on-Chip Designs With NoC Fabrics
Hidden in Plaintext: An Obfuscation-based Countermeasure against FPGA Bitstream Tampering Attacks Read more about Hidden in Plaintext: An Obfuscation-based Countermeasure against FPGA Bitstream Tampering Attacks
Single-shot spatially-localized NQR using field-dependent relaxation rates Read more about Single-shot spatially-localized NQR using field-dependent relaxation rates
SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware Read more about SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware
Fault Attack Detection in AES by Monitoring Power Side-Channel Statistics Read more about Fault Attack Detection in AES by Monitoring Power Side-Channel Statistics
SAFARI: Automatic Synthesis of Fault-Attack Resistant Block Cipher Implementations Read more about SAFARI: Automatic Synthesis of Fault-Attack Resistant Block Cipher Implementations
Hardware Obfuscation and Logic Locking: A Tutorial Introduction Read more about Hardware Obfuscation and Logic Locking: A Tutorial Introduction
Low Power Unsupervised Anomaly Detection by Nonparametric Modeling of Sensor Statistics Read more about Low Power Unsupervised Anomaly Detection by Nonparametric Modeling of Sensor Statistics
Trust Issues in COTS: The Challenges and Emerging Solution Read more about Trust Issues in COTS: The Challenges and Emerging Solution
FaultDroid: An Algorithmic Approach for Fault-Induced Information Leakage Analysis Read more about FaultDroid: An Algorithmic Approach for Fault-Induced Information Leakage Analysis