Comprehensive study of security and privacy of emerging non-volatile memories

MNI Khan, S Ghosh - Journal of low power electronics and applications, 2021 - mdpi.com
Several promising non-volatile memories (NVMs) such as magnetic RAM (MRAM), spin-
transfer torque RAM (STTRAM), ferroelectric RAM (FeRAM), resistive RAM (RRAM), and …

Coherence Attacks and Countermeasures in Interposer-based Chiplet Systems

GA Chacon, C Williams, J Knechtel… - ACM Transactions on …, 2024 - dl.acm.org
Industry is moving towards large-scale hardware systems that bundle processor cores,
memories, accelerators, and so on. via 2.5 D integration. These components are fabricated …

Hardware trojan attack in embedded memory

X Wang, T Hoque, A Basak, R Karam, W Hu… - ACM Journal on …, 2021 - dl.acm.org
Static Random Access Memory (SRAM) is a core technology for building computing
hardware, including cache memory, register files and field programmable gate array …

Large delay analog trojans: A silent fabrication-time attack exploiting analog modalities

T Yang, A Mittal, Y Fei… - IEEE Transactions on Very …, 2020 - ieeexplore.ieee.org
This article presents large delay-based analog Trojan circuits, a new class of analog Trojans
that can be interfaced with digital and analog macros to launch fabrication-time hardware …

Optimization of Embedded System With Edge Computing and Sleep Modes for Balance Between Energy Consumption and Cache Occupancy

C Hou - IEEE Transactions on Automation Science and …, 2024 - ieeexplore.ieee.org
The paper considers the embedded system that can either compute tasks locally by itself or
offload tasks to the edge server for remote computing during the running period (RP) and …

ExclaveFL: Providing Transparency to Federated Learning using Exclaves

J Guo, K Vaswani, A Paverd, P Pietzuch - arXiv preprint arXiv:2412.10537, 2024 - arxiv.org
In federated learning (FL), data providers jointly train a model without disclosing their
training data. Despite its privacy benefits, a malicious data provider can simply deviate from …

Hardware-assisted security monitoring unit for real-time ensuring secure instruction execution and data processing in embedded systems

X Wang, Z Zhang, Q Hao, D Xu, J Wang, H Jia, Z Zhou - Micromachines, 2021 - mdpi.com
The hardware security of embedded systems is raising more and more concerns in
numerous safety-critical applications, such as in the automotive, aerospace, avionic, and …

Hardware trojan threats to cache coherence in modern 2.5 D chiplet systems

GA Chacon, C Williams, J Knechtel… - IEEE Computer …, 2022 - ieeexplore.ieee.org
As industry moves toward chiplet-based designs, the insertion of hardware Trojans poses a
significant threat to the security of these systems. These systems rely heavily on cache …

A morphable physically unclonable function and true random number generator using a commercial magnetic memory

MNI Khan, CY Cheng, SH Lin, A Ash-Saki… - Journal of Low Power …, 2021 - mdpi.com
We use commercial magnetic memory to realize morphable security primitives, a Physically
Unclonable Function (PUF) and a True Random Number Generator (TRNG). The PUF …

Design, threat analysis and countermeasures for cache replacement policy-affecting Hardware Trojans in the context of a many-core system

S Hazra, B Avinash, M Dalui - Microelectronics Journal, 2023 - Elsevier
Hardware Trojans, which threaten system reliability and integrity, have emerged as a
security threat to the IC industry. Hardware manufacturers acquire ICs from unreliable third …