Machine Learning in Hardware Security of IoT Nodes

T Lavanya, K Rajalakshmi - VLSI and Hardware …, 2021 - api.taylorfrancis.com
In semiconductor technology, there has been enormous progress, which has brought about
a great amount of participation in the design stage and development stages of integrated …

[PDF][PDF] Machine learning Based Hardware Trojans Detection in Integrated Circuits: A Systematic Review

RSP Ranjan - researchgate.net
A purposefully inserted additional circuit known as the Hardware Trojan (HT) is implanted
inside original integrated circuits during the designing or manufacturing stages. It has the …

Comparative Analysis of Multiresolution Features Through Power Side-Channel Signals for Hardware Trojan Detection

SJ Pungati, B Dhakale, S Kadam, A Bhurane… - Available at SSRN … - papers.ssrn.com
Abstract Hardware Trojans (HTs) has become a significant security concern for integrated
circuits (IC) as they can be used to compromise the functionality and confidentiality of the …

Hardware Intrinsic Attacks on IoT Based Network: A Secure Edge Intelligence Perspective

HR Mohammed - 2021 - search.proquest.com
Abstract Internet of Things (IoT) devices has connected millions of houses around the globe
via the internet. Running Artificial Intelligence (AI) on IoT devices is popular nowadays …

[图书][B] Data-Driven Modeling and Analysis for Trustworthy Cyber-Physical Systems

S Faezi - 2021 - search.proquest.com
In the age of digitization, a layer of cyber software sits on a hardware circuit and controls the
physical systems around us. The tight integration of cyber and physical components is …

[PDF][PDF] Deep Learning for Predictive Maintenance

A Natsiou - 2020 - ikee.lib.auth.gr
This master thesis analyses classic maintenance techniques indicating their disadvantages
and investigating whether predictive methods would be beneficial for this topic. A quick …

Instruction prefetch based power control

M Houston, RK Albright, B Goska, S Ganju… - US Patent …, 2024 - Google Patents
Abstract Systems and methods herein address power for one or more processing units,
using one of a plurality of power profiles during execution of a group of real-time instructions …

[PDF][PDF] Analytical Toolbox

C Lettner - 2020 - iot4cps.at
Observing complex cyber-physical systems (CPS) or even networks of complex cyber-
physical systems is a critical contemporary challenge for companies across Austria. The …

IP Trust Assurance through Design and Runtime Solutions

T Hoque - 2020 - search.proquest.com
The economic advantage of outsourcing the design, fabrication, and assembly process of
electronic components has driven the semiconductor industry to rely on various foreign …

Fault attack hardware Trojan detection method based on ring oscillator

Q Bi, N Wu, F Zhou, J Zhang, MR Yahya… - IEICE Electronics …, 2019 - jstage.jst.go.jp
Recently proposed common hardware Trojan detection methods can detect wide range of
Trojan types, however, there is no explicit detection method for specific Trojan types. These …