Decision model with quantification of buyer-supplier trust in advanced technology enterprises

ZA Collier, U Guin, J Sarkis, JH Lambert - … : An International Journal, 2021 - emerald.com
Purpose In the buyer-supplier relationship of a high-technology enterprise, the concepts of
trust and risk are closely intertwined. Entering into a buyer-supplier relationship inherently …

Open source hardware design and hardware reverse engineering: A security analysis

J Baehr, A Hepp, M Brunner… - 2022 25th Euromicro …, 2022 - ieeexplore.ieee.org
Major industry-led initiatives such as RISC-V and OpenTitan strive for verified, customizable
and standardized products, based on a combination of Open Source Hardware (OSHW) and …

[图书][B] Logic Locking: A Practical Approach to Secure Hardware

D Sisejkovic, R Leupers - 2022 - books.google.com
A subtle change that leads to disastrous consequences—hardware Trojans undoubtedly
pose one of the greatest security threats to the modern age. How to protect hardware against …

Hardware Trojans

D Sisejkovic, R Leupers - Logic Locking: A Practical Approach to Secure …, 2022 - Springer
Classifying hardware Trojans is certainly a challenging and, sometimes, never-ending task.
The limitless design variability makes it increasingly difficult to capture all necessary features …

The Path to Fault-and Intrusion-Resilient Manycore Systems on a Chip

A Shoker, P Esteves-Verissimo… - 2023 53rd Annual IEEE …, 2023 - ieeexplore.ieee.org
The hardware computing landscape is changing. What used to be distributed systems can
now be found on a chip with highly configurable, diverse, specialized and general purpose …

Deep-ultraviolet optoelectronic devices enabled by the hybrid integration of next-generation semiconductors and emerging device platforms

N Alfaraj - 2019 - repository.kaust.edu.sa
In this dissertation, the design and fabrication of deep-ultraviolet photodetectors were
investigated based on gallium oxide and its alloys, through the heterogeneous integration …

Blockchain and time-delay based hardware Trojan detection

D Zhai - 2022 - eprints.soton.ac.uk
Nowadays, various electronic devices bring convenience to people's life and work, which is
inseparable from the development of microelectronics technology. The IC chip is the core …

[PDF][PDF] The Path to Fault-and Intrusion-Resilient Manycore Systems on a Chip

ASP Esteves-Verissimo, M Völp - repository.kaust.edu.sa
The hardware computing landscape is changing. What used to be distributed systems can
now be found on a chip with highly configurable, diverse, specialized and general purpose …

Logic Locking

A subtle change that leads to disastrous consequences—hardware Trojans undoubtedly
pose one of the greatest security threats to the modern age. How to protect hardware against …

[PDF][PDF] Designing trustworthy hardware with logic locking

D Šišejković - scholar.archive.org
From smartphones and laptops to automotive, medical, and defense applications,
microelectronic devices are deeply anchored in the modern way of life. This everincreasing …