Robust machine learning systems: Challenges, current trends, perspectives, and the road ahead

M Shafique, M Naseer, T Theocharides… - IEEE Design & …, 2020 - ieeexplore.ieee.org
Currently, machine learning (ML) techniques are at the heart of smart cyber-physical
systems (CPSs) and Internet-of-Things (loT). This article discusses various challenges and …

Neuroattack: Undermining spiking neural networks security through externally triggered bit-flips

V Venceslai, A Marchisio, I Alouani… - … Joint Conference on …, 2020 - ieeexplore.ieee.org
Due to their proven efficiency, machine-learning systems are deployed in a wide range of
complex real-life problems. More specifically, Spiking Neural Networks (SNNs) emerged as …

MacLeR: machine learning-based runtime hardware trojan detection in resource-constrained IoT edge devices

F Khalid, SR Hasan, S Zia, O Hasan… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Traditional learning-based approaches for runtime hardware Trojan (HT) detection require
complex and expensive on-chip data acquisition frameworks, and thus incur high area and …

Architecting a secure wireless interconnect for multichip communication: An ML approach

MM Ahmed, A Vashist, SMP Dinakarrao… - 2020 Asian Hardware …, 2020 - ieeexplore.ieee.org
Compute-intensive platforms such as micro-servers and embedded systems have already
undergone a shift from a single-chip to multichip architecture to achieve better yield and …

Hardware Trojan designs based on high-low probability and partitioned combinational logic with a malicious reset signal

J Shi, X Zhang, P Ma, W Pan, P Li… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
To counteract logic-testing methods and trust verification methods for hardware Trojan (HT)
detection, two HT design strategies based on high-low probability and partitioned …

HIT: a hidden instruction trojan model for processors

J Zhang, Y Zhang, H Li, J Jiang - 2020 Design, Automation & …, 2020 - ieeexplore.ieee.org
This paper explores an intrusion mechanism to microprocessors using illegal instructions,
namely hidden instruction Trojan (HIT). It uses a low-probability sequence consisting of …