Device-specific security challenges and solution in IoT edge computing: a review
Rapid growth in IoT technology demands the need for the emergence of new IoT devices.
IoT devices vary in terms of shape, size, storage, battery life, and computational power …
IoT devices vary in terms of shape, size, storage, battery life, and computational power …
Stealing neural network structure through remote FPGA side-channel analysis
Deep Neural Network (DNN) models have been extensively developed by companies for a
wide range of applications. The development of a customized DNN model with great …
wide range of applications. The development of a customized DNN model with great …
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention
R Mukherjee, SR Rajendran… - Journal of Cryptographic …, 2022 - Springer
Hardware Trojans have emerged as a great threat to the trustability of modern electronic
systems. A deployed electronic system with one or more undetected Hardware Trojan …
systems. A deployed electronic system with one or more undetected Hardware Trojan …
Hardware trojan detection using graph neural networks
The globalization of the Integrated Circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third party …
fabrication, and testing process from a single trusted entity to various untrusted third party …
HW2VEC: A graph learning tool for automating hardware security
The time-to-market pressure and continuous growing complexity of hardware designs have
promoted the globalization of the Integrated Circuit (IC) supply chain. However, such …
promoted the globalization of the Integrated Circuit (IC) supply chain. However, such …
GNN4IP: Graph neural network for hardware intellectual property piracy detection
Aggressive time-to-market constraints and enormous hardware design and fabrication costs
have pushed the semiconductor industry toward hardware Intellectual Properties (IP) core …
have pushed the semiconductor industry toward hardware Intellectual Properties (IP) core …
Detecting hardware trojans in PCBs using side channel loopbacks
Malicious modifications to printed circuit boards (PCBs) are known as hardware Trojans.
These may arise when malafide third parties alter PCBs premanufacturing or …
These may arise when malafide third parties alter PCBs premanufacturing or …
Golden reference-free hardware trojan localization using graph convolutional network
R Yasaei, S Faezi… - IEEE Transactions on Very …, 2022 - ieeexplore.ieee.org
The globalization of the integrated circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third-party …
fabrication, and testing process from a single trusted entity to various untrusted third-party …
Detection method of Golden Chip-Free Hardware Trojan based on the combination of ResNeXt structure and attention mechanism
S Chen, T Wang, Z Huang, X Hou - Computers & Security, 2023 - Elsevier
Since 2007, the use of side-channel data to detect hardware Trojans (HT) has been widely
studied. Machine learning methods are widely used in the detection of hardware Trojans …
studied. Machine learning methods are widely used in the detection of hardware Trojans …
Neuroscience-inspired algorithms for the predictive maintenance of manufacturing systems
AV Malawade, ND Costa, D Muthirayan… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
If machine failures can be detected preemptively, then maintenance and repairs can be
performed more efficiently, reducing production costs. Many machine learning techniques …
performed more efficiently, reducing production costs. Many machine learning techniques …