In today's integrated circuit (IC) ecosystem, owning a foundry is not economically viable, and therefore most IC design houses are now working under a fabless business model. In order …
In this work, we advance the security promise of split manufacturing through judicious handling of interconnects. First, we study the cost-security tradeoffs underlying for split …
D Deng, Y Wang, Y Guo - IEEE Transactions on Computer …, 2020 - ieeexplore.ieee.org
With the separation of design and manufacture in semiconductor industry, self-designed circuits are exposed to hardware Trojan attacks when they are outsourced to an …
Y Yang, Z Chen, Y Liu, TY Ho, Y Jin… - ACM Transactions on …, 2020 - dl.acm.org
With the trend of outsourcing fabrication, split manufacturing is regarded as a promising way to both acquire the high-end nodes in untrusted external foundries and protect the design …
Hardware Trojans are malicious modifications made to a circuit for the purpose of altering its behavior. If Integrated Circuit (IC) fabrication is outsourced to an untrusted foundry, learning …
A Monteiro, AJ Mathew, GV Colaco… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
For any system dealing with data, security is an essential factor. With increasing manufacturig and production costs, many companies rely on external facilities. There is a …
Enterprises use site-to-site Virtual Private Network (VPN) technology to securely transmit data over insecure networks, such as the Internet. By utilizing commercial VPN products …
The scientific community has been consistently working on the pervasive problem of information leakage, uncovering numerous attack vectors, and proposing various …
High-quality randomness is an essential component of cryptographic designs. Biases and deviations from expected distributions can significantly affect or neutralize security …