—Energy becomes the primary concern in nowadays multi-core architecture designs. Moore’s law predicts that the exponentially increasing number of cores can be packed into a sin...
Qiaosha Zou, Matthew Poremba, Rui He, Wei Yang, Ju...
Probing attack is a severe threat for the security of hardware cryptographic modules (HCMs). In this paper, we make the first step to evaluate the vulnerability of HCMs against p...
Lingxiao Wei, Jie Zhang, Feng Yuan, Yannan Liu, Ju...
—As the feature size keeps scaling down and the circuit complexity increases rapidly, a more advanced hybrid lithography, which combines multiple patterning and e-beam lithograph...
Yunfeng Yang, Wai-Shing Luk, Hai Zhou, Changhao Ya...
— Runtime monitoring is of great importance as a safe guard to guarantee the correctness of system runtime behaviors. Two new methods, i.e., dynamic counters and l-repetitive fun...
— Multiple Independent Gate Field Effect Transistors (MIGFETs) are expected to push FET technology further into the semiconductor roadmap. In a MIGFET, supplementary gates either...
Machine learning algorithms are advocated for automated diagnosis of board-level functional failures due to the extreme complexity of the problem. Such reasoning-based solutions, ...
Zelong Sun, Li Jiang, Qiang Xu, Zhaobo Zhang, Zhiy...
—This paper presents an oscillator-based true random number generator (TRNG) that automatically adjusts the duty cycle of a fast oscillator to 50 %, and generates unbiased random...
This paper explores hardware specialization of low power processors to improve performance and energy efficiency. Our main contribution is an automated framework that analyzes in...
: Collaboration between enterprises has moved from regional and national environments to a global one. This has tremendously increased the need for information exchange between col...
: The paper describes the single range observability issues related to a kinematics model of cooperating underwater vehicles. The paper extends previous results building on an augm...