Exploring Attack Vectors and Resilient Defense Strategies in Microelectronics A Special Session on Hardware Security
In this dedicated session, we delve into five pivotal talks concerning hardware security. The session encompasses:
- Investigation into attacks on quantum random access memory
- Enhancing security in the NAND Flash memory supply chain
- The utilization of permissioned blockchains for supply chain management
- Introduction of a novel method for detecting hardware Trojans in manufactured microelectronics
- Harnessing random self-reducibility to combat physical attacks on microelectronics
Fortifying the NAND Flash Supply Chain with Innovative Security Primitives
Optimizing Supply Chain Management using Permissioned Blockchains
Detecting Hardware Trojans in Manufactured Chips without Reference: A GMM-Based Approach