Harnessing Nanoscale Device Properties for Hardware Security

Author(s):  
Bicky Shakya ◽  
Fahim Rahman ◽  
Mark Tehranipoor ◽  
Domenic Forte
1999 ◽  
Author(s):  
D. Munteanu ◽  
S. Cristoloveanu ◽  
Isaac Lagnado ◽  
Paul de la Houssaye

Author(s):  
Sandip Tiwari

Unique nanoscale phenomena arise in quantum and mesoscale properties and there are additional intriguing twists from effects that are classical in origin. In this chapter, these are brought forth through an exploration of quantum computation with the important notions of superposition, entanglement, non-locality, cryptography and secure communication. The quantum mesoscale and implications of nonlocality of potential are discussed through Aharonov-Bohm effect, the quantum Hall effect in its various forms including spin, and these are unified through a topological discussion. Single electron effect as a classical phenomenon with Coulomb blockade including in multiple dot systems where charge stability diagrams may be drawn as phase diagram is discussed, and is also extended to explore the even-odd and Kondo consequences for quantum-dot transport. This brings up the self-energy discussion important to nanoscale device understanding.


2021 ◽  
Vol 54 (4) ◽  
pp. 1-39
Author(s):  
Wei Hu ◽  
Armaiti Ardeshiricham ◽  
Ryan Kastner

Information flow tracking (IFT) is a fundamental computer security technique used to understand how information moves through a computing system. Hardware IFT techniques specifically target security vulnerabilities related to the design, verification, testing, manufacturing, and deployment of hardware circuits. Hardware IFT can detect unintentional design flaws, malicious circuit modifications, timing side channels, access control violations, and other insecure hardware behaviors. This article surveys the area of hardware IFT. We start with a discussion on the basics of IFT, whose foundations were introduced by Denning in the 1970s. Building upon this, we develop a taxonomy for hardware IFT. We use this to classify and differentiate hardware IFT tools and techniques. Finally, we discuss the challenges yet to be resolved. The survey shows that hardware IFT provides a powerful technique for identifying hardware security vulnerabilities, as well as verifying and enforcing hardware security properties.


Author(s):  
Francesco Regazzoni ◽  
Shivam Bhasin ◽  
Amir Ali Pour ◽  
Ihab Alshaer ◽  
Furkan Aydin ◽  
...  

Author(s):  
Silviya Ninova ◽  
Osman Baris Malcioglu ◽  
Philipp Auburger ◽  
Matthias Franke ◽  
Ole Lytken ◽  
...  

Porphyrins are key elements in organic-inorganic hybrid systems for a wide range of applications. Understanding their interaction with the substrate gives a handle on structural and electronic device properties. Here...


Sign in / Sign up

Export Citation Format

Share Document