Securing Third-Party IP: A Vital Step in Safeguarding the Design Supply Chain
The “Shift Left” Approach in Hardware Security
Microarchitecture Vulnerabilities: Uncovering the Root Cause Weaknesses
Why Semiconductor Security Is More Important Than Ever in 2024
Accelerating the DoD’s Access to Commercial Microelectronic Design Security Technology
Enhancing Automotive Security with MITRE CWE
Getting Ahead of the Curve with Automotive Security Compliance
Creating Comprehensive and Verifiable Hardware Security Requirements
A Security Maturity Model for Hardware Development
Verifying the OpenTitan Hardware Root of Trust
A New Phase in Our Journey to Trustworthy Electronic Products
Ensuring Security by Design is Actually Secure
A History of Hardware Security and What it Means for Today’s Systems
Hardware Security Optimization with MITRE CWE
What is MoonBounce? Why You Should Be Concerned and What You Can Do About It
Building a More Secure U.S. Microelectronic Design Infrastructure
The Most Important CWEs For Hardware Security
Detecting Spectre Using Radix
Power Side-Channel Analysis Against Values Squashed in the Processor Pipeline
Detecting Meltdown Using Radix
Darpa Toolbox – Accelerating innovation for forward looking security research
Information Flow Analysis: Tracking Information through Hardware Designs
Establishing a Special Interest Group on Common Hardware Weaknesses
Hardware Security — A Critical Piece of the Cybersecurity Puzzle
Hardware Security Verification with CWE and Information Flow Analysis
Reducing Hardware Security Risk
You Probably Have a Lot of Dead Hens in Your Hardware Design