The outsourcing of integrated circuit (IC) fabrication services to overseas manufacturing foundry has raised security and privacy concerns with regard to intellectual property (IP) protection as well as the integrity maintenance of the fabricated chips. One way to protect ICs from malicious attacks is to encrypt and obfuscate the IP design by incorporating additional key gates, namely logic encryption or logic locking. The state-of-the-art logic encryption techniques certainly incur considerable performance overhead upon the genuine IP design. The focus of this paper is to leverage the unique property of emerging transistor technology on reducing the performance overhead as well as preserving the robustness of logic locking technique. We de...
International audienceIntellectual property protection is a major concern for fabless IC designers. ...
The significant rise in the cost of manufacturing nanoscale integrated circuits (ICs) has led the ma...
International audienceIn this paper, we propose a hardware security methodology for mixed-signal Int...
The outsourcing of integrated circuit (IC) fabrication services to overseas manufacturing foundry ha...
A strong logic locking approach could be utilized to contest serious threats on ICs. However, recent...
Hardware security concerns such as intellectual property (IP) piracy and hardware Trojans have trigg...
Hardware security concerns such as IP piracy and hardware Trojans have triggered research into circu...
International audienceDesign and reuse has become a very common practice in the electronics design i...
Emerging devices have been designed and fabricated to extend Moore\u27s Law. While the benefits over...
With an ever-increasing globalization of the semiconductor chip manufacturing supply chain coupled w...
Polymorphic gates are capable of adapting to multiple functionalities depending on the application a...
Due to the globalization of Integrated Circuit (IC) design in the semiconductor industry and the out...
In this paper, a key-controlled hybrid spin-CMOS polymorphic logic gate using a novel 5 terminal mag...
1Semiconductor supply chain is increasingly getting exposed to variety of security attacks such as T...
International audienceThe outsourcing business model is dominating the semiconductor industry. Due t...
International audienceIntellectual property protection is a major concern for fabless IC designers. ...
The significant rise in the cost of manufacturing nanoscale integrated circuits (ICs) has led the ma...
International audienceIn this paper, we propose a hardware security methodology for mixed-signal Int...
The outsourcing of integrated circuit (IC) fabrication services to overseas manufacturing foundry ha...
A strong logic locking approach could be utilized to contest serious threats on ICs. However, recent...
Hardware security concerns such as intellectual property (IP) piracy and hardware Trojans have trigg...
Hardware security concerns such as IP piracy and hardware Trojans have triggered research into circu...
International audienceDesign and reuse has become a very common practice in the electronics design i...
Emerging devices have been designed and fabricated to extend Moore\u27s Law. While the benefits over...
With an ever-increasing globalization of the semiconductor chip manufacturing supply chain coupled w...
Polymorphic gates are capable of adapting to multiple functionalities depending on the application a...
Due to the globalization of Integrated Circuit (IC) design in the semiconductor industry and the out...
In this paper, a key-controlled hybrid spin-CMOS polymorphic logic gate using a novel 5 terminal mag...
1Semiconductor supply chain is increasingly getting exposed to variety of security attacks such as T...
International audienceThe outsourcing business model is dominating the semiconductor industry. Due t...
International audienceIntellectual property protection is a major concern for fabless IC designers. ...
The significant rise in the cost of manufacturing nanoscale integrated circuits (ICs) has led the ma...
International audienceIn this paper, we propose a hardware security methodology for mixed-signal Int...