Articles with "hardware security" as a keyword



Low‐Power Optoelectronic Hybrid Perovskite‐Based Memristor for Ternary Hardware Security Monitoring

Sign Up to like & get
recommendations!
Published in 2025 at "Advanced Functional Materials"

DOI: 10.1002/adfm.202516930

Abstract: Secure intelligent electronics with high integration and adaptability are critical for next‐generation information systems. However, previously reported hardware systems typically employ separate sensing, memory, and processing modules, leading to increased system complexity, high latency, and… read more here.

Keywords: security; hardware security; hybrid perovskite; security monitoring ... See more keywords

Hardware and Information Security Primitives Based on 2D Materials and Devices

Sign Up to like & get
recommendations!
Published in 2022 at "Advanced Materials"

DOI: 10.1002/adma.202205365

Abstract: Hardware security is a major concern for the entire semiconductor ecosystem that accounts for billions of dollars in annual losses. Similarly, information security is a critical need for the rapidly proliferating edge devices that continuously… read more here.

Keywords: information security; hardware security; security; security primitives ... See more keywords

Implementing Multimodal Hardware Security with 2D α‐In2Se3 Ferroelectric Transistor

Sign Up to like & get
recommendations!
Published in 2025 at "Advanced Science"

DOI: 10.1002/advs.202502286

Abstract: Security is a critical challenge in the integrated circuit (IC) industry, yet device‐level hardware security remains largely underexplored. Most existing solutions necessitate modifications to current technology nodes and typically address only a single security threat,… read more here.

Keywords: transistor; hardware security; logic; secure transistor ... See more keywords

Uniqueness and future perspectives of 2D ferroelectric devices: applications in emerging computing paradigms and hardware security.

Sign Up to like & get
recommendations!
Published in 2025 at "Materials horizons"

DOI: 10.1039/d5mh00835b

Abstract: Two-dimensional (2D) ferroelectric materials recently emerged as promising candidates for use in next-generation electronic and photonic applications. Distinct from their bulk counterparts, these atomically thin materials exhibit robust levels of ferroelectricity at monolayer thicknesses, diverse… read more here.

Keywords: hardware security; ferroelectric devices; perspectives ferroelectric; uniqueness future ... See more keywords

Physically Unclonable Function Using GSHE Driven SOT Assisted p-MTJ for Next Generation Hardware Security Applications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3203817

Abstract: The increasing threat of security attacks on hardware security applications has driven research towards exploring beyond CMOS devices as an alternative. Spintronic devices offer advantages like low power, non-volatility, inherent spatial and temporal randomness, simplicity… read more here.

Keywords: hardware security; generation hardware; physically unclonable; security applications ... See more keywords

Logic Locking Using Emerging 2T/3T Magnetic Tunnel Junctions for Hardware Security

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3208650

Abstract: With the advancement of beyond CMOS devices, a new approach to utilize the inherent physics of such emerging structures for various applications is of great interest in recent research. Spintronics-based devices offer key advantages like… read more here.

Keywords: magnetic tunnel; logic locking; tunnel junctions; hardware security ... See more keywords

Era of Sentinel Tech: Charting Hardware Security Landscapes Through Post-Silicon Innovation, Threat Mitigation and Future Trajectories

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3400624

Abstract: To meet the demanding requirements of VLSI design, including improved speed, reduced power consumption, and compact architectures, various IP cores from trusted and untrusted platforms are often integrated into a single System-on-Chip (SoC). However, this… read more here.

Keywords: security; hardware security; post silicon;

The Hardware Security Behind Azure Sphere

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Micro"

DOI: 10.1109/mm.2019.2898633

Abstract: Traditional MCUs are price sensitive devices ill-prepared for the security challenges of internet connectivity. Azure Sphere MCUs are a new cross-over class of MCU with built-in Microsoft security technology, connectivity, and headroom to support dynamic… read more here.

Keywords: hardware security; security behind; security; azure sphere ... See more keywords
Photo from wikipedia

An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design Tools

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2020.3047976

Abstract: Hardware security and trust have become a pressing issue during the last two decades due to the globalization of the semiconductor supply chain and ubiquitous network connection of computing devices. Computing hardware is now an… read more here.

Keywords: hardware security; security; design; security trust ... See more keywords

EigenCircuit: Divergent Synthetic Benchmark Generation for Hardware Security Using PCA and Linear Programming

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2022.3166675

Abstract: Benchmarks are the standards by which technologies can be evaluated and fairly compared. In the field of digital circuits, benchmarks were critical for the development of CAD and FPGA tools decades ago. Hardware security is… read more here.

Keywords: benchmark generation; security; hardware security;