Shubhra Deb Paul
YOU?
Author Swipe
View article: PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans
PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans Open
Printed circuit Boards (PCBs) are becoming increasingly vulnerable to malicious design alteration, also known as Trojan attacks, due to a distributed business model that often involves various untrusted parties. Such attacks can be mounted…
View article: Detecting Dye-Contaminated Vegetables Using Low-Field NMR Relaxometry
Detecting Dye-Contaminated Vegetables Using Low-Field NMR Relaxometry Open
Dyeing vegetables with harmful compounds has become an alarming public health issue over the past few years. Excessive consumption of these dyed vegetables can cause severe health hazards, including cancer. Copper sulfate, malachite green,…
View article: Hands-On Learning of Hardware and Systems Security.
Hands-On Learning of Hardware and Systems Security. Open
View article: Hands-on Learning of Hardware and Systems Security
Hands-on Learning of Hardware and Systems Security Open
Hardware security is one of the most researched areas in the field of security.It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems u…
View article: MeLPUF: Memory-in-Logic PUF Structures for Low-Overhead IC Authentication
MeLPUF: Memory-in-Logic PUF Structures for Low-Overhead IC Authentication Open
Physically Unclonable Functions (PUFs) are used for securing electronic devices across the implementation spectrum ranging from Field Programmable Gate Array (FPGA) to system on chips (SoCs). However, existing PUF implementations often suf…
View article: MeLPUF: Memory in Logic PUF.
MeLPUF: Memory in Logic PUF. Open
Physical Unclonable Functions (PUFs) are used for securing electronic designs across the implementation spectrum ranging from lightweight FPGA to server-class ASIC designs. However, current PUF implementations are vulnerable to model-build…