Hardware IP trust validation: Learn (the untrustworthy), and verify

T Hoque, J Cruz, P Chakraborty… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Increasing reliance on hardware Intellectual Property (IP) cores in modern system-on-chip
(SoC) design flow, often obtained from untrusted vendors distributed across the globe, can …

Robustness for smart cyber physical systems and internet-of-things: From adaptive robustness methods to reliability and security for machine learning

F Kriebel, S Rehman, MA Hanif… - 2018 IEEE Computer …, 2018 - ieeexplore.ieee.org
In recent years, the exponential growth of internet of things (IoT) and cyber physical systems
(CPS) in safety critical applications has imposed severe reliability and security challenges …

Intelligent security measures for smart cyber physical systems

M Shafique, F Khalid, S Rehman - 2018 21st Euromicro …, 2018 - ieeexplore.ieee.org
The exponential growth of cyber-physical systems (CPS), especially in safety-critical
applications, has imposed several security threats (like manipulation of communication …

Runtime hardware Trojan monitors through modeling burst mode communication using formal verification

F Khalid, SR Hasan, O Hasan, F Awwad - Integration, 2018 - Elsevier
Globalization trends in integrated circuit (IC) design using deep sub-micron (DSM)
technologies are leading to increased vulnerability against malicious intrusions. Various …

Forasec: Formal analysis of security vulnerabilities in sequential circuits

F Khalid, IH Abbassi, S Rehman, AM Kamboh… - arXiv preprint arXiv …, 2018 - arxiv.org
Security vulnerability analysis of Integrated Circuits using conventional design-time
validation and verification techniques (like simulations, emulations, etc.) is generally a …

[引用][C] Online Hardware Trojan Detection on SoC Integration Level: Leveraging Machine Learning

S Zia, O Hassan - 2018 - NUST School of Electrical …