IEEE.org
IEEE Xplore Digital Library
IEEE Standards
IEEE Spectrum
More Sites
IEEE Logo
ICCAD 2024
iccad24-logo.svg
  • About
    • Executive Committee
    • Conference History
    • Bylaws
    • FAQ
  • Program
    • Final Program
    • Keynote Speakers
    • ICCAD on Broadway
    • Contests
    • Workshops
    • Tutorials
    • Special Sessions
    • 2024 Award Winners
  • Authors
    • Final Author Instructions
    • Accepted Papers
    • Initial Author Instructions
  • Workforce Development Activities
    • Student Scholar Program
    • Student Research Competition
    • Job Fair
    • CADathlon@ICCAD 2024
    • Activity Organizers
  • Travel/Venue
    • Conference Hotel
    • Avoid Hotel Fraud
    • Things to Do
    • Visa Information
  • Registration
  • Become a Patron
Exploring Attack Vectors and Resilient Defense Strategies in Microelectronics A Special Session on Hardware Security

Exploring Attack Vectors and Resilient Defense Strategies in Microelectronics A Special Session on Hardware Security

In this dedicated session, we delve into five pivotal talks concerning hardware security. The session encompasses: 

  1. Investigation into attacks on quantum random access memory
  2. Enhancing security in the NAND Flash memory  supply chain
  3. The utilization of permissioned blockchains for supply chain management
  4. Introduction of a novel  method for detecting hardware Trojans in manufactured microelectronics
  5. Harnessing random self-reducibility  to combat physical attacks on microelectronics
    • Jakub Szefer.jpg

      Yale University, USA

    Exploration of Timing and Higher-Energy Attacks on Quantum Random Access Memory

    • BiswajitRay.jpg

      Colorado State University, USA

    Fortifying the NAND Flash Supply Chain with Innovative Security Primitives

    • Ujjwal Guin.png

      Auburn University, USA

    Optimizing Supply Chain Management using Permissioned Blockchains

    • Hassan Salmani.jpg

      Howard University, USA

    Detecting Hardware Trojans in Manufactured Chips without Reference: A GMM-Based Approach

  • IEEE Home
  • IEEE Sitemap/More Sites
  • IEEE Contact & Support
  • IEEE Accessibility Statement
  • IEEE Nondiscrimination Policy
  • IEEE Ethics Reporting
  • IEEE Privacy Policy
IEEE Home
IEEE Sitemap/More Sites
IEEE Contact & Support
IEEE Accessibility Statement
IEEE Nondiscrimination Policy
IEEE Ethics Reporting
IEEE Privacy Policy
This site is created, maintained, and managed by Conference Catalysts, LLC .
Please feel free to contact us for any assistance.

© Copyright 2026 IEEE - All rights reserved. Use of this website signifies your agreement to the IEEE Terms and Conditions . A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Registration
  • Become a Patron
Cookie Policy

IEEE websites place cookies on your device to give you the best user experience. By using our websites, you agree to the placement of these cookies. To learn more, read our Privacy Policy.