-
Cross-Layer Fault Analysis for Microprocessor Architectures (CLAM)Fault injection, RTL description, Microprocessor
-
Test and Reliability of Emerging Memory-based Spiking Neural NetworksEmerging memory, test and reliability, neural networks
-
Qualification methodology for ISO26262 certification of automotive SoC systemsQualification, ISO 26262, certification
-
Exploration of security threats in In-Memory Computing ParadigmsIn-Memory Computing, Cryptography, Hardware Security
-
Strategies for securing a memory hierarchy against software side-channel attacksRISCV, Hardware security, DRAM,memory hierarchy, software side channel attack
-
Mitigation of radiation effects on the attitude estimation processing of autonomous thingsSafety-Critical applications, Neutron Radiation Effects, Attitude Estimation Algorithms, Radiation Induced Error Mitigation
-
Secure Processors with respect to Micro Architectural AttacksRISC-V, microarchitectural attacks, secure processor
-
Predictive fault tolerance analysis methodology for complex components with consideration of the applicationVirtual platforms, Radiation, SoC,HW/SW Interface, Fault Tolerance
-
Sensitivity Analysis and Design Methodology for Secure Digital Circuits against X-RaysHardware security,Countermeasures,X-rays,Physical attacks
-
Design of a very low power Artificial Intelligence system (Tensor Processing Unit - TPU) based on memory computation.In Memory Computing (IMC), Static Random Access Memory (SRAM), Tensor Processing Unit (TPU), Convolutional Neural Network (CNN), Non-Volatile Memory (NVM), Low power
-
Design and Evaluation of Resistive-based Security Primitives (Physically Unclonable Function & True Random Number Generator)Memristor, PUF, TRNG