A survey and perspective on artificial intelligence for security-aware electronic design automation
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly
used in several fields to improve performance and the level of automation. In recent years …
used in several fields to improve performance and the level of automation. In recent years …
Physically unclonable functions and ai: Two decades of marriage
The current chapter aims at establishing a relationship between artificial intelligence (AI)
and hardware security. Such a connection between AI and software security has been …
and hardware security. Such a connection between AI and software security has been …
Modeling challenge covariances and design dependency for efficient attacks on strong PUFs
H Wang, W Liu, H Jin, Y Chen… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The physical unclonable function (PUF) is a widely used hardware security primitive. Many
strong PUF designs have been proposed to resist non-invasive attacks leveraging acquired …
strong PUF designs have been proposed to resist non-invasive attacks leveraging acquired …
[PDF][PDF] A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation
Authors' addresses: David Selasi Koblah, dkoblah@ ul. edu; Rabin Yu Acharya, rabin.
acharya@ ul. edu; Daniel Capecci; Olivia P. Dizon-Paradis, Florida Institute for …
acharya@ ul. edu; Daniel Capecci; Olivia P. Dizon-Paradis, Florida Institute for …
Joint Optimization of NCL PUF Using Frequency-based Analysis and Evolutionary Algorithm
RY Acharya, D Forte - 2022 23rd International Symposium on …, 2022 - ieeexplore.ieee.org
Physically unclonable functions (PUFs) are hardware security primitives which can be used
for hardware authentication and cryptographic key generation. The design of PUFs involves …
for hardware authentication and cryptographic key generation. The design of PUFs involves …
Asynchronous Circuits and Their Applications in Hardware Security
Asynchronous circuits are increasingly used as an efficient countermeasure for a wide range
of threats in the microelectronics industry. This chapter provides a tutorial on the basic …
of threats in the microelectronics industry. This chapter provides a tutorial on the basic …