Exploring Attack Vectors and Resilient Defense Strategies in Microelectronics A Special Session on Hardware Security

In this dedicated session, we delve into five pivotal talks concerning hardware security. The session encompasses: 

  1. Investigation into attacks on quantum random access memory
  2. Enhancing security in the NAND Flash memory  supply chain
  3. The utilization of permissioned blockchains for supply chain management
  4. Introduction of a novel  method for detecting hardware Trojans in manufactured microelectronics
  5. Harnessing random self-reducibility  to combat physical attacks on microelectronics
  • Exploration of Timing and Higher-Energy Attacks on Quantum Random Access Memory

  • Fortifying the NAND Flash Supply Chain with Innovative Security Primitives

  • Optimizing Supply Chain Management using Permissioned Blockchains

  • Detecting Hardware Trojans in Manufactured Chips without Reference: A GMM-Based Approach