Reliability issues in state-of-the-art microfluidic biochips: A survey

D Gountia - IETE Technical Review, 2023 - Taylor & Francis
Microfluidic biochips are a prominent class of lab-on-a-chip, ie LoC system, guided with
some activation sequences devised for a bioprotocol to manipulate fluids used in biomedical …

Security closure of IC layouts against hardware Trojans

F Wang, Q Wang, B Fu, S Jiang, X Zhang… - Proceedings of the …, 2023 - dl.acm.org
Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced
nowadays. However, passing ICs through various third-party providers gives rise to many …

A hardware trojan detection and diagnosis method for gate-level netlists based on different machine learning algorithms

Z Huang, C Xie, Z Li, M Du, Q Wang - Journal of Circuits, Systems …, 2022 - World Scientific
The design complexity and outsourcing trend of modern integrated circuits (ICs) have
increased the chance for adversaries to implant hardware Trojans (HTs) in the development …

Probabilistic risk-aware scheduling with deadline constraint for heterogeneous SoCs

X Chen, U Ogras, C Chakrabarti - ACM Transactions on Embedded …, 2022 - dl.acm.org
Hardware Trojans can compromise System-on-Chip (SoC) performance. Protection
schemes implemented to combat these threats cannot guarantee 100% detection rate and …

Adversarial hardware with functional and topological camouflage

H Li, A Abdelhadi, R Shi, J Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The lately attack on the Qualcomm's Snapdragon chip reminds us security risks related to
digital arithmetic circuits. Most system designers neglect the employed computer arithmetic …

TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans

F Wang, Q Wang, L Alrahis, B Fu, S Jiang… - arXiv preprint arXiv …, 2024 - arxiv.org
Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced
nowadays. However, passing ICs through various third-party providers gives rise to many …

Secure Run-Time Hardware Trojan Detection Using Lightweight Analytical Models

B Amornpaisannon, A Diavastos… - … on Computer-Aided …, 2023 - ieeexplore.ieee.org
Hardware Trojans, malicious components that attempt to prevent a chip from operating as
expected, are carefully crafted to circumvent detection during the predeployment silicon …

Towards trust hardware deployment of edge computing: mitigation of hardware trojans based on evolvable hardware

Z Li, J Wang, Z Huang, N Luo, Q Wang - Applied Sciences, 2022 - mdpi.com
Hardware Trojans (HTs) are malicious hardware components designed to leak confidential
information or cause the chip/circuit on which they are integrated to malfunction during …

Design of Abnormal State Monitoring System for Multi-channel Transmission of Social Network Information

J Li, H Murong, J Xing - International Conference on Advanced Hybrid …, 2021 - Springer
The security of social network communication is the most serious problem at present,
because of the error of multiplex transmission, the risk of application security and the limited …

[PDF][PDF] Runtime Monitoring for Dependable Hardware Design

A Vijayan - 2019 - core.ac.uk
With technology scaling advancement and globalization of integrated circuit (IC)
manufacturing, a host of vulnerabilities affect dependability of computing hardware. Each …