专题:Physical Unclonable Functions (PUFs) and Hardware Security

This cluster of papers focuses on hardware security and authentication techniques, including the use of Physical Unclonable Functions (PUFs) for device authentication and key generation, detection and prevention of Hardware Trojans, logic encryption methods, FPGA security, anti-counterfeiting measures, IC reverse engineering, scan-based side-channel attacks, machine learning attacks on hardware, and obfuscation techniques to protect integrated circuits.
最新文献
Spectre Returns! Speculation Attacks Using the Return Stack Buffer

preprint Full Text OpenAlex

Lifting Micro-Update Models from RTL for Formal Security Analysis

article Full Text OpenAlex

Digital Twin Integrity Protection in Distributed Control Systems

article Full Text OpenAlex

FERROMOBILE and Security for Low Moment of Traffic Level Crossing

book-chapter Full Text OpenAlex

Explicit Lower Bounds for Communication Complexity of PSM for Concrete Functions

book-chapter Full Text OpenAlex

Fair Transition Loss: From label noise robustness to bias mitigation

article Full Text OpenAlex

SDR-PUF: Sequence-Dependent Reconfigurable SRAM PUF with an Exponential CRP Space

article Full Text OpenAlex

Characterizing and Modeling Synchronous Clock-Glitch Fault Injection

book-chapter Full Text OpenAlex

Guarding 6G use cases: a deep dive into AI/ML threats in All-Senses meeting

article Full Text OpenAlex

PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks

article Full Text OpenAlex

近5年高被引文献
Digital Twins: A Survey on Enabling Technologies, Challenges, Trends and Future Prospects

article Full Text OpenAlex 707 FWCI112.10457132

Natural Adversarial Examples

article Full Text OpenAlex 664 FWCI69.98737328

6G networks: Beyond Shannon towards semantic and goal-oriented communications

article Full Text OpenAlex 428 FWCI51.64390851

Semi-invasive attacks – A new approach to hardware security analysis

article Full Text OpenAlex 345 FWCI0

Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities

article Full Text OpenAlex 326 FWCI34.71147949

PSCC-Net: Progressive Spatio-Channel Correlation Network for Image Manipulation Detection and Localization

article Full Text OpenAlex 285 FWCI35.15687153

Digital Twin: A Comprehensive Survey of Security Threats

article Full Text OpenAlex 254 FWCI40.27519253

Batteryless NFC dosimeter tag for ionizing radiation based on commercial MOSFET

article Full Text OpenAlex 253 FWCI41.96862623

A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review

review Full Text OpenAlex 253 FWCI110.76717756

Compromising emanations: eavesdropping risks of computer displays

article Full Text OpenAlex 250 FWCI0