relOBI: A Reliable Low-latency Interconnect for Tightly-Coupled On-chip Communication By Michael Rogenmoser, ETH Zurich August 12, 2025
Enabling Space-Grade AI/ML with RISC-V: A Fully European Stack for Autonomous Missions By Pablo Ghiglino, Klepsydra August 5, 2025
CANDoSA: A Hardware Performance Counter-Based Intrusion Detection System for DoS Attacks on Automotive CAN bus By Franco Oberti, Dumarey August 4, 2025
How Next-Gen Chips Are Unlocking RISC-V’s Customization Advantage By Marc Evans, Andes Technology July 24, 2025
Efficient Hardware-Assisted Heap Memory Safety for Embedded RISC-V Systems By Hyunjae Park, Inha University July 23, 2025
Automatically Retargeting Hardware and Code Generation for RISC-V Custom Instructions By Kari Hepola, Tampere University July 22, 2025
Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection By Matej Bölcskei, ETH Zurich July 15, 2025
Understanding LTTPR: Enabling High-Speed DisplayPort Interconnects in Complex System Designs By Brandon LoGuercio, Trilinear Technologies July 15, 2025
Breaking the HBM Bit Cost Barrier: Domain-Specific ECC for AI Inference Infrastructure By Rui Xie, Rensselaer Polytechnic Institute July 11, 2025
Analyzing Collusion Threats in the Semiconductor Supply Chain By Sanjay (Jay) Rekhi, Computer Security Information Technology Laboratory July 7, 2025
FastPath: A Hybrid Approach for Efficient Hardware Security Verification By Lucas Deutschmann, RPTU Kaiserslautern-Landau July 2, 2025
TROJAN-GUARD: Hardware Trojans Detection Using GNN in RTL Designs By Kiran Thorat, University of Connecticut June 27, 2025
How a Standardized Approach Can Accelerate Development of Safety and Security in Automotive Imaging Systems By Philip Hawkes, MIPI Alliance June 26, 2025
SV-LLM: An Agentic Approach for SoC Security Verification using Large Language Models By Dipayan Saha, University of Florida June 25, 2025