2022 - 03 - 22
TPM 2.0-Ready: Top Security with PUFcc
The Tale of TPM The rising security threats endangering […]
2021 - 10 - 06
Securing the IC Supply Chain – Integrating PUF-Based hardware security
The semiconductor supply chain is vulnerable to hacks t […]
2021 - 09 - 30
Adopting PUF to Implement Zero Trust Architecture
The Executive Order issued by the US White House on May […]
2021 - 03 - 02
Standardized PUF-based Solution for Device eID
1. Introduction Generally speaking IoT/AIoT&n […]
2021 - 01 - 28
PUF is a Hardware Solution for the Sunburst Hack
On December 14, 2020, SolarWinds, which provides networ […]
2020 - 04 - 23
Build Trust in Silicon: A Myth or a Reality?
Abstract: Currently, there is a strong belief among the […]
2020 - 01 - 15
Is Blockchain the Silver Bullet of IoT Security?
Abstract Blockchain has been proposed as a “Truste […]
2019 - 11 - 13
The Promise of Formal Methods to PUF Security Assurance
Abstract Due to the emerging technology nature of PUF a […]
2019 - 09 - 12
“To be or not to be?” & “To be what?” those are two big questions for Libra!
Abstract: Facebook has revealed plans to launch its new […]
2019 - 09 - 11
The good, the bad and the ugly of hardware security
Abstract Data encryption can be implemented either by h […]