A survey on hardware security: Current trends and challenges

S Akter, K Khalil, M Bayoumi - IEEE Access, 2023 - ieeexplore.ieee.org
Hardware security has become a critical concern due to the globalization of the Integrated
Circuit (IC) supply chain and the complex network connections of computing-intensive …

Hardware security for and beyond CMOS technology: an overview on fundamentals, applications, and challenges

J Knechtel - Proceedings of the 2020 International Symposium on …, 2020 - dl.acm.org
As with most aspects of electronic systems and integrated circuits, hardware security has
traditionally evolved around the dominant CMOS technology. However, with the rise of …

Security closure of physical layouts ICCAD special session paper

J Knechtel, J Gopinath, J Bhandari… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Computer-aided design (CAD) tools traditionally optimize for power, performance, and area
(PPA). However, given a vast number of hardware security threats, we call for secure-by …

Towards secure composition of integrated circuits and electronic systems: On the role of EDA

J Knechtel, EB Kavun, F Regazzoni… - … , Automation & Test …, 2020 - ieeexplore.ieee.org
Modern electronic systems become evermore complex, yet remain modular, with integrated
circuits (ICs) acting as versatile hardware components at their heart. Electronic design …

Analyzing security vulnerabilities induced by high-level synthesis

N Pundir, S Aftabjahani, R Cammarota… - ACM Journal on …, 2022 - dl.acm.org
High-level synthesis (HLS) is essential to map the high-level language (HLL) description
(eg, in C/C++) of hardware design to the corresponding Register Transfer Level (RTL) to …

Qflow: Quantitative information flow for security-aware hardware design in verilog

LM Reimann, L Hanel, D Sisejkovic… - 2021 IEEE 39th …, 2021 - ieeexplore.ieee.org
The enormous amount of code required to design modern hardware implementations often
leads to critical vulnerabilities being overlooked. Especially vulnerabilities that compromise …

Saif: Automated asset identification for security verification at the register transfer level

N Farzana, A Ayalasomayajula… - 2021 IEEE 39th VLSI …, 2021 - ieeexplore.ieee.org
With the increasing complexity, modern system-onchip (SoC) designs are becoming more
susceptible to security attacks and require comprehensive security assurance. However …

Hardware security for and beyond CMOS technology

J Knechtel - Proceedings of the 2021 International Symposium on …, 2021 - dl.acm.org
As with most aspects of electronic systems and integrated circuits, hardware security has
traditionally evolved around the dominant CMOS technology. However, with the rise of …

Quantitative Fault Injection Analysis

J Feldtkeller, T Güneysu, P Schaumont - … on the Theory and Application of …, 2023 - Springer
Active fault injection is a credible threat to real-world digital systems computing on sensitive
data. Arguing about security in the presence of faults is non-trivial, and state-of-the-art …

Towards scalable, secure, and smart mission-critical IoT systems: review and vision

X Guo, S Han, XS Hu, X Jiao, Y Jin, F Kong… - Proceedings of the …, 2021 - dl.acm.org
Recent emerging technologies such as artificial intelligence and machine learning have
been promising enormous economic and societal benefits. While it is desirable to deploy …