Hardware IP trust validation: Learn (the untrustworthy), and verify
Increasing reliance on hardware Intellectual Property (IP) cores in modern system-on-chip
(SoC) design flow, often obtained from untrusted vendors distributed across the globe, can …
(SoC) design flow, often obtained from untrusted vendors distributed across the globe, can …
Robustness for smart cyber physical systems and internet-of-things: From adaptive robustness methods to reliability and security for machine learning
In recent years, the exponential growth of internet of things (IoT) and cyber physical systems
(CPS) in safety critical applications has imposed severe reliability and security challenges …
(CPS) in safety critical applications has imposed severe reliability and security challenges …
Intelligent security measures for smart cyber physical systems
The exponential growth of cyber-physical systems (CPS), especially in safety-critical
applications, has imposed several security threats (like manipulation of communication …
applications, has imposed several security threats (like manipulation of communication …
Runtime hardware Trojan monitors through modeling burst mode communication using formal verification
Globalization trends in integrated circuit (IC) design using deep sub-micron (DSM)
technologies are leading to increased vulnerability against malicious intrusions. Various …
technologies are leading to increased vulnerability against malicious intrusions. Various …
Forasec: Formal analysis of security vulnerabilities in sequential circuits
Security vulnerability analysis of Integrated Circuits using conventional design-time
validation and verification techniques (like simulations, emulations, etc.) is generally a …
validation and verification techniques (like simulations, emulations, etc.) is generally a …
[引用][C] Online Hardware Trojan Detection on SoC Integration Level: Leveraging Machine Learning
S Zia, O Hassan - 2018 - NUST School of Electrical …