TPM 2.0-Ready: Top Security with PUFcc
The Tale of TPM The rising security threats endangering […]
Securing the IC Supply Chain – Integrating PUF-Based hardware security
The semiconductor supply chain is vulnerable to hacks t […]
Adopting PUF to Implement Zero Trust Architecture
The Executive Order issued by the US White House on May […]
Standardized PUF-based Solution for Device eID
1. Introduction Generally speaking IoT/AIoT&n […]
PUF is a Hardware Solution for the Sunburst Hack
On December 14, 2020, SolarWinds, which provides networ […]
Build Trust in Silicon: A Myth or a Reality?
Abstract: Currently, there is a strong belief among the […]
Is Blockchain the Silver Bullet of IoT Security?
Abstract Blockchain has been proposed as a “Truste […]
The Promise of Formal Methods to PUF Security Assurance
Abstract Due to the emerging technology nature of PUF a […]
“To be or not to be?” & “To be what?” those are two big questions for Libra!
Abstract: Facebook has revealed plans to launch its new […]
The good, the bad and the ugly of hardware security
Abstract Data encryption can be implemented either by h […]