Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Foundries
biblio
Combining Enhanced Diagnostic-Driven Analysis Scheme and Static Near Infrared Photon Emission Microscopy for Effective Scan Failure Debug
Submitted by aekwall on Thu, 02/02/2023 - 4:23pm
integrated circuits
Software
Resiliency
Human behavior
composability
Product design
Inspection
static analysis
Foundries
pubcrawl
defect prediction (key words)
failure analysis
microscopy
photon emission microscopy
Scan Diagnosis
scan failure
biblio
High-level Intellectual Property Obfuscation via Decoy Constants
Submitted by grigby1 on Wed, 06/08/2022 - 10:21am
intellectual property security
SAT attack
reverse engineering
Resiliency
resilience
pubcrawl
policy-based governance
Logic gates
IP obfuscation
pattern locks
intellectual property
hardware obfuscation
Hardware
Foundries
digital FIR filter design
composability
Complexity theory
automatic test pattern generation
biblio
Is Register Transfer Level Locking Secure?
Submitted by aekwall on Mon, 10/04/2021 - 1:53pm
integrated circuits
Logic gates
security
Hardware
pubcrawl
Scalability
Resiliency
Human behavior
Registers
Foundries
Layout
pattern locks
biblio
Hardware IP Protection Using Logic Encryption and Watermarking
Submitted by grigby1 on Wed, 08/11/2021 - 3:27pm
Logic gates
encryption
pubcrawl
policy-based governance
collaboration
resilience
Resiliency
Integrated circuit modeling
composability
Foundries
Watermarking
ip protection
reverse engineering
shift registers
biblio
Attacking Split Manufacturing from a Deep Learning Perspective
Submitted by aekwall on Mon, 11/09/2020 - 1:42pm
integrated circuit split manufacturing
integrated circuit manufacture
Foundries
back-end-of-line parts
BEOL connections
different foundries
FEOL facility
front-end-of-line
image-based features
IP piracy
ISCAS-85benchmarks
layout-level placement
Metals
network-flow attack
security promise
sophisticated deep neural network
vector-based features
neural nets
invasive software
computer architecture
learning (artificial intelligence)
Resiliency
pubcrawl
composability
policy-based governance
deep learning
security of data
manufacturing systems
Capacitance
industrial property
Image Processing
Wires
Layout
Pins
biblio
A Comprehensive Security System for Digital Microfluidic Biochips
Submitted by grigby1 on Mon, 11/02/2020 - 1:36pm
private key cryptography
intellectual property security
invasive software
IP piracy
Lab-on-a-Chip
malicious attackers
Microfluidics
Pins
policy-based governance
intellectual property piracy
pubcrawl
resilience
Resiliency
secret keys
security
trojan
Trojan attacks
Trojan horses
comprehensive security system
authentication mechanism
bioassay completion time
biochips market
biology computing
bioMEMS
Cameras
CCD cameras
composability
authentication
Computer crime
defense mechanisms
Digital Microfluidic Biochips
Digital Microfluidics
DMFBs
Electrodes
Foundries
industrial property
biblio
Best of Both Worlds: Integration of Split Manufacturing and Camouflaging into a Security-Driven CAD Flow for 3D ICs
Submitted by grigby1 on Thu, 07/30/2020 - 2:06pm
pubcrawl
Layout
layout camouflaging
LC
malicious entities
manufacturing
manufacturing flow
manufacturing paradigm
Metrics
production engineering computing
ip protection
resilience
reverse engineering
security
security-driven CAD flow
SM
split manufacturing
supply chains
Three-dimensional displays
extensive security analysis
policy-based governance
composability
IP piracy
3D ICs
business models
CAD
Cryptography
DRC-clean layouts
Resiliency
Foundries
Human behavior
Human Factors
industrial property
integrated circuit design
integrated circuit manufacture
integrated circuits
IP networks
biblio
Can Multi-Layer Microfluidic Design Methods Aid Bio-Intellectual Property Protection?
Submitted by grigby1 on Thu, 07/30/2020 - 1:48pm
biointellectual property protection
ip protection
skilled person-hour investment
significant fiscal person-hour investment
Product design
Multiplexing
multilayer microfluidic design methods
Mixers
Microfluidics
Lab-on-a-Chip
intellectual property rights
Foundries
biotechnology
bioMEMS
pubcrawl
bioassay implementation
bioassay developer
Three-dimensional displays
reverse engineering
Valves
Layout
Nonhomogeneous media
composability
industrial property
Resiliency
resilience
policy-based governance
biblio
On the Impossibility of Approximation-Resilient Circuit Locking
Submitted by grigby1 on Thu, 03/12/2020 - 12:02pm
IC
signature based defense
security guarantees
Scalability
Resiliency
resilience
relaxed notion
pubcrawl
original circuit
microscopy
malicious foundry
long-standing hardness assumptions
logic locking
learning (artificial intelligence)
Integrated circuit modeling
Integrated Circuit Camouflaging
Adversary Models
Foundries
formally defined notions
formal approach
exponentially approximation-resilient
exact-recovery-resiliency
digital signatures
Cryptography
Computational modeling
cL
Boolean functions
boolean circuits
benchmark circuits
approximation-resilient Circuit locking
approximation-resiliency
algorithmic attacks
biblio
Golden Gates: A New Hybrid Approach for Rapid Hardware Trojan Detection Using Testing and Imaging
Submitted by grigby1 on Wed, 02/26/2020 - 4:38pm
Resiliency
Logic Test
low accuracy
malicious modifications
microscopy
modern military systems
new hybrid approach
pubcrawl
rapid hardware trojan detection
resilience
Logic gates
reverse engineering
scanning electron microscopy
security
SEM images
superlative accuracy
supply chain security
trojan horse detection
Trojan horses
grave threat
commercial systems
cyber physical systems
detection method
exhaustive test infrastructure
existing gate footprints
Foundries
GGC
golden chip
golden gate circuits
backside ultra thinning
Hardware
Hardware Trojans
high classification accuracy
high time cost
Image analysis
Imaging
integrated circuits
invasive software
1
2
next ›
last »