[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 17, Issue 3July 2021
Editor:
  • Ramesh Karri
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:1550-4832
EISSN:1550-4840
Reflects downloads up to 01 Jan 2025Bibliometrics
Skip Table Of Content Section
research-article
Architecting for Artificial Intelligence with Emerging Nanotechnology
Article No.: 26, Pages 1–33https://doi.org/10.1145/3445977

Artificial Intelligence is becoming ubiquitous in products and services that we use daily. Although the domain of AI has seen substantial improvements over recent years, its effectiveness is limited by the capabilities of current computing technology. ...

research-article
Open Access
A Survey Describing Beyond Si Transistors and Exploring Their Implications for Future Processors
Article No.: 27, Pages 1–44https://doi.org/10.1145/3453143

The advancement of Silicon CMOS technology has led information technology innovation for decades. However, scaling transistors down according to Moore’s law is almost reaching its limitations. To improve system performance, cost, and energy efficiency, ...

research-article
Temporal State Machines: Using Temporal Memory to Stitch Time-based Graph Computations
Article No.: 28, Pages 1–27https://doi.org/10.1145/3451214

Race logic, an arrival-time-coded logic family, has demonstrated energy and performance improvements for applications ranging from dynamic programming to machine learning. However, the various ad hoc mappings of algorithms into hardware rely on researcher ...

SECTION: Special Issue on Emerging Challenges and Solutions in Hardware Security
research-article
Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach
Article No.: 30, Pages 1–26https://doi.org/10.1145/3431389

Logic locking is a prominent technique to protect the integrity of hardware designs throughout the integrated circuit design and fabrication flow. However, in recent years, the security of locking schemes has been thoroughly challenged by the introduction ...

research-article
Attack Mitigation of Hardware Trojans for Thermal Sensing via Micro-ring Resonator in Optical NoCs
Article No.: 31, Pages 1–23https://doi.org/10.1145/3433676

As an emerging role in new-generation on-chip communication, optical networks-on-chip (ONoCs) provide ultra-high bandwidth, low latency, and low power dissipation for data transfers. However, the thermo-optic effects of the photonic devices have a great ...

research-article
DTA-PUF: Dynamic Timing-aware Physical Unclonable Function for Resource-constrained Devices
Article No.: 32, Pages 1–24https://doi.org/10.1145/3434281

In recent years, physical unclonable functions (PUFs) have gained a lot of attention as mechanisms for hardware-rooted device authentication. While the majority of the previously proposed PUFs derive entropy using dedicated circuitry, software PUFs ...

research-article
Hardware Trojan Horse Detection through Improved Switching of Dormant Nets
Article No.: 33, Pages 1–22https://doi.org/10.1145/3439951

Covert Hardware Trojan Horses (HTH) introduced by malicious attackers during the fabless manufacturing process of integrated circuits (IC) have the potential to cause malignant functions within the circuit. This article employs a Design-for-Security ...

research-article
Improving the Quality of FPGA RO-PUF by Principal Component Analysis (PCA)
Article No.: 34, Pages 1–25https://doi.org/10.1145/3442444

Ring Oscillator Physical Unclonable Functions (RO-PUFs) exploit the inherent manufacturing process variations, such as systematic and stochastic variations, to generate secret PUF responses that are unique to the device. Stochastic variations are random, ...

research-article
Timing-Optimized Hardware Implementation to Accelerate Polynomial Multiplication in the NTRU Algorithm
Article No.: 35, Pages 1–16https://doi.org/10.1145/3445979

Post-quantum cryptographic algorithms have emerged to secure communication channels between electronic devices faced with the advent of quantum computers. The performance of post-quantum cryptographic algorithms on embedded systems has to be evaluated to ...

research-article
Machine Learning Vulnerability Analysis of FPGA-based Ring Oscillator PUFs and Counter Measures
Article No.: 36, Pages 1–20https://doi.org/10.1145/3445978

Physical Unclonable Functions (PUFs) exploit the manufacturing process variations inherent in silicon-based chips to generate unique secret keys. Although PUFs are supposed to be unclonable or unbreakable, researchers have found that they are vulnerable ...

research-article
Robust and Attack Resilient Logic Locking with a High Application-Level Impact
Article No.: 37, Pages 1–22https://doi.org/10.1145/3446215

Logic locking is a hardware security technique aimed at protecting intellectual property against security threats in the IC supply chain, especially those posed by untrusted fabrication facilities. Such techniques incorporate additional locking circuitry ...

research-article
Bridging the Gap between RTL and Software Fault Injection
Article No.: 38, Pages 1–24https://doi.org/10.1145/3446214

Protecting programs against hardware fault injection requires accurate software fault models. However, typical models, such as the instruction skip, do not take into account the microarchitecture specificities of a processor. We propose in this article an ...

research-article
CONCEALING-Gate: Optical Contactless Probing Resilient Design
Article No.: 39, Pages 1–25https://doi.org/10.1145/3446998

Optical probing, though developed as silicon debugging tools from the chip backside, has shown its capability of extracting secret data, such as cryptographic keys and user identifications, from modern system-on-chip devices. Existing optical probing ...

research-article
Open Access
The Uncertainty of Side-channel Analysis: A Way to Leverage from Heuristics
Article No.: 40, Pages 1–27https://doi.org/10.1145/3446997

Performing a comprehensive side-channel analysis evaluation of small embedded devices is a process known for its variability and complexity. In real-world experimental setups, the results are largely influenced by a huge amount of parameters, some of ...

research-article
Improving Deep Learning Networks for Profiled Side-channel Analysis Using Performance Improvement Techniques
Article No.: 41, Pages 1–30https://doi.org/10.1145/3453162

The use of deep learning techniques to perform side-channel analysis attracted the attention of many researchers as they obtained good performances with them. Unfortunately, the understanding of the neural networks used to perform side-channel attacks is ...

research-article
Public Access
Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses
Article No.: 42, Pages 1–38https://doi.org/10.1145/3456299

There is an increasing body of work in the area of hardware defenses for software-driven security attacks. A significant challenge in developing these defenses is that the space of security vulnerabilities and exploits is large and not fully understood. ...

research-article
A Lightweight Architecture for Hardware-Based Security in the Emerging Era of Systems of Systems
Article No.: 43, Pages 1–25https://doi.org/10.1145/3458824

In recent years, a new generation of the Internet of Things (IoT 2.0) is emerging, based on artificial intelligence, the blockchain technology, machine learning, and the constant consolidation of pre-existing systems and subsystems into larger systems. In ...

research-article
SILVerIn: Systematic Integrity Verification of Printed Circuit Board Using JTAG Infrastructure
Article No.: 44, Pages 1–28https://doi.org/10.1145/3460232

A printed circuit board (PCB) provides necessary mechanical support to an electronic system and acts as a platform for connecting electronic components. Counterfeiting and in-field tampering of PCBs have become significant security concerns in the ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.