Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection By Matej Bölcskei, ETH Zurich July 15, 2025
Understanding LTTPR: Enabling High-Speed DisplayPort Interconnects in Complex System Designs By Brandon LoGuercio, Trilinear Technologies July 15, 2025
Breaking the HBM Bit Cost Barrier: Domain-Specific ECC for AI Inference Infrastructure By Rui Xie, Rensselaer Polytechnic Institute July 11, 2025
Analyzing Collusion Threats in the Semiconductor Supply Chain By Sanjay (Jay) Rekhi, Computer Security Information Technology Laboratory July 7, 2025
FastPath: A Hybrid Approach for Efficient Hardware Security Verification By Lucas Deutschmann, RPTU Kaiserslautern-Landau July 2, 2025
TROJAN-GUARD: Hardware Trojans Detection Using GNN in RTL Designs By Kiran Thorat, University of Connecticut June 27, 2025
How a Standardized Approach Can Accelerate Development of Safety and Security in Automotive Imaging Systems By Philip Hawkes, MIPI Alliance June 26, 2025
SV-LLM: An Agentic Approach for SoC Security Verification using Large Language Models By Dipayan Saha, University of Florida June 25, 2025
Enabling Chiplet Design Through Automation and Integration Solutions By Andy Nightingale, Arteris June 25, 2025
Shift-Left Verification: Why Early Reliability Checks Matter By Chun-hsiang Chang, OmniVision Technologies June 24, 2025
All-in-One Analog AI Hardware: On-Chip Training and Inference with Conductive-Metal-Oxide/HfOx ReRAM Devices By Donato Francesco Falcone, IBM Research June 23, 2025
From I2C to I3C: Evolution of Two-Wire Communication in Embedded Systems By Piotr Koziuk, Chip Interfaces June 17, 2025
QiMeng: Fully Automated Hardware and Software Design for Processor Chip By Rui Zhang, Institute of Computing Technology, CAS June 13, 2025
RISC-V source class riscv_asm_program_gen, the brain behind assembly instruction generator By Shailesh Vasekar, VeriFast June 13, 2025