Performance enhancement of unsupervised hardware trojan detection algorithm using clustering-based local outlier factor technique for design security

S Meenakshi - … IEEE International Test Conference India (ITC …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) has become extremely prominent for industrial applications and
stealthy modification deliberately done by insertion of Hardware Trojans has increased …

Configuration security of fpga in iot using logic resource protection

S Meenakshi, M Nirmala Devi - … Conference on Advances in Electrical and …, 2021 - Springer
Field-programmable gate arrays (FPGAs) consist of configurable logic blocks that have the
reconfiguration property which provides the flexibility for the designer to reconfigure it for …

[PDF][PDF] Lightweight PUF-Based Gate Replacement Technique to Reduce Leakage of Information through Power Profile Analysis

N Devi M - International Journal of Electronics and …, 2022 - journals.pan.pl
The major challenge faced by electronic device designers is to defend the system from
attackers and malicious modules called Hardware Trojans and to deliver a secured design …

Limes: Logic locking on interleaved memory for enhanced security

A Sai Prasanna, J Tejeswini, N Mohankumar - Computer Networks, Big …, 2021 - Springer
Globalization and increasing distribution of IC supply chain have resulted in various third
parties having a key to precious intellectual property or the physical integrated circuit and …

Lightweight PUF-Based Gate Replacement Technique to Reduce Leakage of Information through Power Profile Analysis

N Mohankumar, M Jayakumar… - International Journal of …, 2022 - yadda.icm.edu.pl
The major challenge faced by electronic device designers is to defend the system from
attackers and malicious modules called Hardware Trojans and to deliver a secured design …

Novel retimed obfuscated architecture of discrete cosine transformation for optimization and enhancing the security

A Sharma, J Pathak - AIP Conference Proceedings, 2023 - pubs.aip.org
With the rapid advancement of technology and the internet, it has become increasingly
difficult to secure the functionality and designs of Integrated Circuits (ICs), Intellectual …