Device-specific security challenges and solution in IoT edge computing: a review

A Roy, J Kokila, N Ramasubramanian… - The Journal of …, 2023 - Springer
Rapid growth in IoT technology demands the need for the emergence of new IoT devices.
IoT devices vary in terms of shape, size, storage, battery life, and computational power …

Stealing neural network structure through remote FPGA side-channel analysis

Y Zhang, R Yasaei, H Chen, Z Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Deep Neural Network (DNN) models have been extensively developed by companies for a
wide range of applications. The development of a customized DNN model with great …

A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention

R Mukherjee, SR Rajendran… - Journal of Cryptographic …, 2022 - Springer
Hardware Trojans have emerged as a great threat to the trustability of modern electronic
systems. A deployed electronic system with one or more undetected Hardware Trojan …

Hardware trojan detection using graph neural networks

R Yasaei, L Chen, SY Yu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The globalization of the Integrated Circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third party …

HW2VEC: A graph learning tool for automating hardware security

SY Yu, R Yasaei, Q Zhou, T Nguyen… - … Oriented Security and …, 2021 - ieeexplore.ieee.org
The time-to-market pressure and continuous growing complexity of hardware designs have
promoted the globalization of the Integrated Circuit (IC) supply chain. However, such …

GNN4IP: Graph neural network for hardware intellectual property piracy detection

R Yasaei, SY Yu, EK Naeini… - 2021 58th ACM/IEEE …, 2021 - ieeexplore.ieee.org
Aggressive time-to-market constraints and enormous hardware design and fabrication costs
have pushed the semiconductor industry toward hardware Intellectual Properties (IP) core …

Detecting hardware trojans in PCBs using side channel loopbacks

H Pearce, VR Surabhi, P Krishnamurthy… - … Transactions on Very …, 2022 - ieeexplore.ieee.org
Malicious modifications to printed circuit boards (PCBs) are known as hardware Trojans.
These may arise when malafide third parties alter PCBs premanufacturing or …

Golden reference-free hardware trojan localization using graph convolutional network

R Yasaei, S Faezi… - IEEE Transactions on Very …, 2022 - ieeexplore.ieee.org
The globalization of the integrated circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third-party …

Detection method of Golden Chip-Free Hardware Trojan based on the combination of ResNeXt structure and attention mechanism

S Chen, T Wang, Z Huang, X Hou - Computers & Security, 2023 - Elsevier
Since 2007, the use of side-channel data to detect hardware Trojans (HT) has been widely
studied. Machine learning methods are widely used in the detection of hardware Trojans …

Neuroscience-inspired algorithms for the predictive maintenance of manufacturing systems

AV Malawade, ND Costa, D Muthirayan… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
If machine failures can be detected preemptively, then maintenance and repairs can be
performed more efficiently, reducing production costs. Many machine learning techniques …