Advances in Hardware Security Research

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Circuit and Signal Processing".

Deadline for manuscript submissions: 15 August 2024 | Viewed by 392

Special Issue Editors


E-Mail Website
Guest Editor
Qualcomm Technologies, Inc., San Diego, CA 95616, USA
Interests: hardware security

E-Mail Website
Guest Editor
Electrical & Computer Engineering Department, University of the Peloponnese, 26334 Patras, Greece
Interests: integrated circuit design for security systems; encryption algorithms and signal processing systems; methods of searching for hardware trojans in integrated circuits; hardware design for embedded systems
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Codelucida Inc., USA, Tucson, AZ 85701, USA
Interests: hardware security; biochip security

Special Issue Information

Dear Colleagues,

Integrated circuits (IC) have become ubiquitous in our everyday life ranging from smartphones to military-grade applications. The security of applications on these devices are critically dependent on the underlying IC or system-on-chip (SoC) that ensures the privacy, authenticity, and integrity of the entire solution stack. However, with the growth of third-party intellectual property (3-PIP) combined with the globalization of the IC supply chain, ease of access to critical assets has created soft targets for cybercriminals to perform malicious activities on the device. Consequently, this has led to calls for a re-evaluation of the trustworthiness of the underlying ICs.

Needless to say, protecting against these threats has become critical, especially given the high-value effort involved in IC design. Through this Special Issue, we aim to raise awareness about the emerging threats in the field of IC design and manufacturing. The articles will be of particular interest to professionals working in the hardware industry spanning the entire silicon ecosystem including design, technology, foundry, electronic-design automation (EDA), test, and in-field debugging. With a multi-disciplinary community effort, this Issue offers new insights in evaluating the state-of-the-art hardware security attacks and defenses that will provide a foundation for future endeavors. The topics of interest include, but are not limited to:

  1. IP piracy/counterfeiting/overbuilding: Attacks and defenses;
  2. Hardware Trojans: Attacks and defenses;
  3. Hardware security: Primitives, architecture, and design and test;
  4. Side-channel analysis.

Dr. Abhrajit Sengupta
Prof. Dr. Paris Kitsos
Dr. Mohammed Shayan
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IP piracy
  • hardware Trojans
  • EDA
  • design and test
  • side-channel analysis

Published Papers

This special issue is now open for submission.
Back to TopTop