Now showing items 1-2 of 2

    • Authentication of IC based on Electromagnetic Signature 

      Ahmed, Mosabbah Mushir; Hely, David; Siragusa, Romain; Barbot, Nicolas; Perret, Etienne (2016-11-14)
      Conference report
      Open Access
      IC Counterfeiting is becoming serious issue. The approach discussed here is to use Electromagnetic (EM) input to an IC and measure its EM input output response. The idea is to extract a signature from EM response which ...
    • Reusing Logic Masking to Facilitate Hardware Trojan Detection 

      Nejat, Arash; Hely, David; Beroulle, Vincent (2016-11-16)
      Conference report
      Open Access
      Hardware Trojan (HT) and Integrated Circuit (IC)/ Intellectual Property (IP) piracy are important threats which may happen in untrusted fabrication foundries. Modifying structurally the ICs/IPs design to counter the HT ...