专题:Physical Unclonable Functions (PUFs) and Hardware Security

This cluster of papers focuses on hardware security and authentication techniques, including the use of Physical Unclonable Functions (PUFs) for device authentication and key generation, detection and prevention of Hardware Trojans, logic encryption methods, FPGA security, anti-counterfeiting measures, IC reverse engineering, scan-based side-channel attacks, machine learning attacks on hardware, and obfuscation techniques to protect integrated circuits.
最新文献
Examining Deep Learning Models for Reliable Detection of Copy-Move Forgeries in Digital Images

article Full Text OpenAlex

Detecting Hardware Trojans in Microprocessors via Hardware Error Correction Code-based Modules

article Full Text OpenAlex

TIMA-PUF: Time Measurement Based Arbiter PUF

article Full Text OpenAlex

ProjAttacker: A Configurable Physical Adversarial Attack for Face Recognition via Projector

article Full Text OpenAlex

ChipletQuake: On-Die Digital Impedance Sensing for Chiplet and Interposer Verification

article Full Text OpenAlex

Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future Trends

article Full Text OpenAlex

The Fake-Busy and True-Idle Problems of Running Graph Applications on Chiplet-Based Multi-Cores

article Full Text OpenAlex

Fabrication and Performance Analysis of Anti-Electrostatic Discharge Integrated Semiconductor Bridges with Varied Dimensions

article Full Text OpenAlex

Quantum-driven optical security: a hybrid experimental-computational framework for unclonable authentication

article Full Text OpenAlex

A High-Order Masking with Load-Delay-Equalized WDDL for Provable Side-Channel Security

article Full Text OpenAlex

近5年高被引文献
Natural Adversarial Examples

article Full Text OpenAlex 548 FWCI45.964

Digital Twins: A Survey on Enabling Technologies, Challenges, Trends and Future Prospects

article Full Text OpenAlex 490 FWCI71.113

6G networks: Beyond Shannon towards semantic and goal-oriented communications

article Full Text OpenAlex 363 FWCI37.623

Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities

article Full Text OpenAlex 271 FWCI25.526

Batteryless NFC dosimeter tag for ionizing radiation based on commercial MOSFET

article Full Text OpenAlex 252 FWCI41.077

PSCC-Net: Progressive Spatio-Channel Correlation Network for Image Manipulation Detection and Localization

article Full Text OpenAlex 202 FWCI23.419

Digital Twin: A Comprehensive Survey of Security Threats

article Full Text OpenAlex 196 FWCI28.534

Halide perovskite memristors as flexible and reconfigurable physical unclonable functions

article Full Text OpenAlex 189 FWCI11.696

A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review

review Full Text OpenAlex 186 FWCI18.591

Internet of Things: Security and Solutions Survey

review Full Text OpenAlex 178 FWCI7.944