Fuzz, penetration, and ai testing for soc security verification: Challenges and solutions

KZ Azar, MM Hossain, A Vafaei, H Al Shaikh… - Cryptology ePrint …, 2022 - eprint.iacr.org
The ever-increasing usage and application of system-on-chips (SoCs) has resulted in the
tremendous modernization of these architectures. For a modern SoC design, with the …

Sharpen: Soc security verification by hardware penetration test

H Al-Shaikh, A Vafaei, MMM Rahman, KZ Azar… - Proceedings of the 28th …, 2023 - dl.acm.org
As modern SoC architectures incorporate many complex/heterogeneous intellectual
properties (IPs), the protection of security assets has become imperative, and the number of …

EnSAFe: enabling sustainable SoC security auditing using eFPGA-based accelerators

MMM Rahman, S Tarek, KZ Azar… - … Symposium on Defect …, 2023 - ieeexplore.ieee.org
The utilization of reconfigurable and flexible acceleration for compute-intensive kernels, eg,
neural networks, crypto-engines, and arithmetics, have been on the rise in recent years …

PSC-watermark: power side channel based IP watermarking using clock gates

U Das, MS Rahman, NN Anandakumar… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
With the ever-increasing re-use of intellectual property (IP) cores in modern system-on-chips
(SoCs), it is crucial to prevent security risks such as IP piracy and overuse. Considering that …

LLE: mitigating IC piracy and reverse engineering by last level edit

S Rahman, N Varshney, F Farahmandi… - … for Testing and …, 2023 - dl.asminternational.org
Hardware obfuscation is a proactive design-for-trust technique against integrated circuit (IC)
supply chain threats, ie, intellectual property (IP) piracy and overproduction. Many studies …

A Zero Trust-based framework employed by Blockchain Technology and Ring Oscillator Physical Unclonable Functions for security of Field Programmable Gate Array …

A Kulkarni, NA Hazari, M Niamat - IEEE Access, 2024 - ieeexplore.ieee.org
The field programmable gate array (FPGA) supply chain is vulnerable to security issues from
untrusted participants involved, resulting in the significant research being conducted in this …

Adaptive PUF design to authenticate and evaluate heterogeneous IPs in edge computing

S Hemavathy, J Kokila… - The Journal of …, 2024 - Springer
Edge computing has become quintessential in commercial, healthcare, and industrial
applications. It enables real-time data processing at the edge device, thus reducing the data …

CAPEC: A Cellular Automata Guided FSM-based IP Authentication Scheme

MMM Rahman, MS Rahman, R Kibria… - 2023 IEEE 41st VLSI …, 2023 - ieeexplore.ieee.org
The ever-increasing propensity for intellectual property (IP) reuse has reduced the design
productivity gap in the supply chain. As a consequence, protecting IPs has become more …

Rtl-fsmx: Fast and accurate finite state machine extraction at the rtl for security applications

R Kibria, MS Rahman, F Farahmandi… - 2022 IEEE …, 2022 - ieeexplore.ieee.org
At the early stage of the design process, many security vulnerability assessment solutions
require fast and precise extraction of the finite state machines (FSMs) present in the register …

GEM-water: generation of em-based watermark for SoC IP validation with hidden FSMs

PP Sarker, U Das, MB Monjil… - … for Testing and …, 2023 - dl.asminternational.org
Intellectual property (IP) core reuse is a common practice for accelerating new product
development in modern system-on-chip (SoC) architectures. However, reusing and sharing …