1-20 of 35 Search Results for

hardware security

Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
EDFA Technical Articles (2019) 21 (3): 16–24.
Published: 01 August 2019
... serve as trust verification tools and provides practical guidelines for making hardware more secure. This article presents a comprehensive study of physical inspection and attack methods, describing the approaches typically used by counterfeiters and adversaries as well as the risks and threats...
Journal Articles
EDFA Technical Articles (2019) 21 (4): 60–62.
Published: 01 November 2019
...E.L. Principe This column discusses the potential benefits of developing a dedicated synchrotron-based tool suite for advanced, high-throughput characterization, deprocessing, and validation of ICs. Copyright © ASM International® 2019 2019 ASM International hardware security synchrotron...
Journal Articles
EDFA Technical Articles (2022) 24 (4): 22–29.
Published: 01 November 2022
... to distinguish between a high and a low state. Unfortunately, the various physical implementations of NVM cannot always be considered secure from a hardware security perspective. The physical phenomena in these emerging devices can be observed or interfered with using different imaging or fault injection...
Journal Articles
EDFA Technical Articles (2022) 24 (4): 12–21.
Published: 01 November 2022
... International® ELECTRONIC DEVICE FAILURE ANALYSIS | VOLUME 24 NO. 4 MEMOMETER: MEMORY PUF-BASED HARDWARE METERING METHODOLOGY FOR FPGAs Anvesh Perumalla and John M. Emmert Department of Electrical and Computer Engineering, University of Cincinnati, Ohio john.emmert@uc.edu INTRODUCTION Security, assurance...
Journal Articles
EDFA Technical Articles (2015) 17 (3): 12–19.
Published: 01 August 2015
... emission from off-state leakage current,[1] hardware security,[2] and reverse engineering applications,[3] imaging large areas of the chip may be necessary for extracting important information. However, the aggressive scaling of transistor dimensions as well as the increase in chip size pose a challenge...
Journal Articles
EDFA Technical Articles (2021) 23 (2): 4–12.
Published: 01 May 2021
..., and provides insights on effective countermeasures. Copyright © ASM International® 2021 2021 ASM International electro-optical probing flip-chip packages hardware security laser fault injection optical attack threat models 4 httpsdoi.org/10.31399/asm.edfa.2021-2.p004 1537-0755/$19.00 ©ASM...
Journal Articles
EDFA Technical Articles (2022) 24 (2): 24–32.
Published: 01 May 2022
... attacks along with practical countermeasures. Copyright © ASM International® 2022 2022 ASM International countermeasures hardware security interposers optical attacks 24 EDFAAO (2022) 2:24-32 httpsdoi.org/10.31399/asm.edfa.2022-2.p024 1537-0755/$19.00 ©ASM International® ELECTRONIC...
Journal Articles
EDFA Technical Articles (2019) 21 (2): 30–36.
Published: 01 May 2019
... address these challenges. ADDRESSING TRUST AND ASSURANCE THROUGH RE Counterfeit and tampered ICs pose serious threats to hardware-based trust and assurance. In particular, cloned chips and hardware Trojans can violate security requirements of root-of-trust by altering physical integrity and electronic...
Journal Articles
EDFA Technical Articles (2017) 19 (4): 36–44.
Published: 01 November 2017
... in electrical engineering from the University of Maryland in 2010 and 2013, respectively. He is an Assistant Professor with the Electrical and Computer Engineering Department at the University of Florida. Dr. Forte s research covers the entire domain of hardware security, from nanodevices to PCBs, with more...
Journal Articles
EDFA Technical Articles (2016) 18 (4): 16–22.
Published: 01 November 2016
... the IBM T.J. Watson Research Center as a postdoctoral researcher, becoming a research staff member in 2004. His major interests are the development and use of new optical methodologies for very-large-scale integration circuit testing and hardware security. He has more than 85 international publications...
Journal Articles
EDFA Technical Articles (2019) 21 (1): 12–19.
Published: 01 February 2019
... and computer engineering from Carnegie Mellon University (CMU). He was the recipient of the best paper award at the ACM Great Lakes Symposium on VLSI in 2017. His research interests include integrated circuit testing, machine learning hardware implementation, and hardware security. Ben Niewenhuis received his...
Journal Articles
EDFA Technical Articles (2022) 24 (3): 12–22.
Published: 01 August 2022
... in the SEM image processing domain. REFERENCES 1. Q. Shi, et al.: Golden Gates: A New Hybrid Approach for Rapid Hardware Trojan Detection using Testing and Imaging, Proceedings of the 2019 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2019, May 2019, p. 61 71, DOI: 10.1109/ HST...
Journal Articles
EDFA Technical Articles (2024) 26 (3): 14–24.
Published: 01 August 2024
..., Bangladesh, in 2019. He is currently pursuing a Ph.D. in the Electrical and Computer Engineering Department, University of Florida, Gainesville, Fla. His research is focused on multidie packaging security, hardware security and trust, and physical inspection and attacks. Chengjie Xi received an M.S. degree...
Journal Articles
EDFA Technical Articles (2021) 23 (4): 4–13.
Published: 01 November 2021
..., Journal of Hardware and Systems Security, DOI: 10.1007/s41635-019-00086-6, 2019. (continued on page 12) edfas.org 12 A SAMPLE PREPARATION WORKFLOW FOR DELAYERING A 45 nm NODE SPI MODULE (continued from page 10) ELECTRONIC DEVICE FAILURE ANALYSIS | VOLUME 23 NO. 4 3. U. Botero, et al.: Hardware Trust...
Journal Articles
EDFA Technical Articles (2021) 23 (3): 24–31.
Published: 01 August 2021
... memory (ReRAM) showed its relevance on emerging technologies.[3] In parallel to failure analysis, there has been a growing interest from the hardware security community for this technique and its capability to extract encryption keys from ICs has been reported by several research groups.[4] Hence, photon...
Journal Articles
EDFA Technical Articles (2022) 24 (4): 4–11.
Published: 01 November 2022
... coordinator in the area of hardware security and open-source activities. Christian Boit retired in 2018 as chair of the Semiconductor Devices Department at Technische Universitaet Berlin, Germany. His research focuses on IC failure analysis (FA) and contactless fault isolation (CFI). In recent years, he...
Journal Articles
EDFA Technical Articles (2021) 23 (3): 13–22.
Published: 01 August 2021
..., and use it to send data over the Internet. The publication launched a firestorm of controversy. One security professional quoted in the article said that finding evidence of a nation-state level attack on hardware was like finding a unicorn jumping over a rainbow. Government agencies, however, largely...
Journal Articles
EDFA Technical Articles (2016) 18 (3): 18–21.
Published: 01 August 2016
..., and many of us have garage-door openers, but do we really need these things in the emerging IoT world? Could a system recognize us and let us into our homes securely and conveniently without a key or garage-door opener? It would be great if, when my car approached the driveway of my home, the system sensed...
Journal Articles
EDFA Technical Articles (2013) 15 (4): 52–54.
Published: 01 November 2013
... manager at IARPA in the Office of Safe and Secure Operations, where he manages the CAT program. From 2010 to 2012, he was a program manager in the Defense Advanced Research Projects Agency (DARPA) Microsystems Technology Office (MTO), focused on microelectronic integration and hardware assurance...
Journal Articles
EDFA Technical Articles (2015) 17 (3): 50–52.
Published: 01 August 2015
... PROGRAM Carl E. McCants, Program Manager, Safe and Secure Operations Office carl.mccants@iarpa.gov PROGRAM OVERVIEW The semiconductor industry is continuing its move forward with Moore s Law, as 14 nm FinFET integrated circuits are currently in production, and 10 nm circuits are expected within the next...