Learning malicious circuits in FPGA bitstreams

R Elnaggar, J Chaudhuri, R Karri… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Computing platforms are integrating field-programmable gate arrays (FPGAs) to support
domain-specific customization. Multiple tenants can share these FPGAs by configuring them …

Detection of malicious FPGA bitstreams using CNN-based learning

J Chaudhuri, K Chakrabarty - 2022 IEEE European Test …, 2022 - ieeexplore.ieee.org
Multi-tenant FPGAs are increasingly being used in cloud computing technologies. Users are
able to access the FPGA fabric remotely to implement custom accelerators in the cloud …

Proactive critical energy infrastructure protection via deep feature learning

K Fotiadou, TH Velivassaki, A Voulkidis, D Skias… - Energies, 2020 - mdpi.com
Autonomous fault detection plays a major role in the Critical Energy Infrastructure (CEI)
domain, since sensor faults cause irreparable damage and lead to incorrect results on the …

Diagnosis of malicious bitstreams in cloud computing fpgas

J Chaudhuri, K Chakrabarty - IEEE Transactions on Computer …, 2023 - ieeexplore.ieee.org
Multitenant field-programmable gate arrays (FPGAs) are increasingly being used in cloud
computing technologies. Users are able to access the FPGA fabric remotely to implement …

Brain tumor detection from brain MRI using soft IP core on FPGA

N Tabassum, SMR Islam, F Bulbul - Circuits, Systems, and Signal …, 2023 - Springer
Field-programmable gate array (FPGA) attempts a proper solution for fulfilling the
requirements of high-performance real-time DSP systems. Any IP core based on FPGA has …

A deep learning-based FPGA function block detection method with bitstream to image transformation

M Chen, P Liu - IEEE Access, 2021 - ieeexplore.ieee.org
In the context of various application scenarios and/or for the sake of strengthening field-
programmable gate array (FPGA) security, the system functions of an FPGA design need to …

Detection and Classification of Malicious Bitstreams for FPGAs in Cloud Computing

J Chaudhuri, K Chakrabarty - Proceedings of the 28th Asia and South …, 2023 - dl.acm.org
As FPGAs are increasingly shared and remotely accessed by multiple users and third
parties, they introduce significant security concerns. Modules running on an FPGA may …

Automating Hardware Trojan Detection Using Unsupervised Learning: A Case Study of FPGA

S Rajput, J Dofe, W Danesh - 2023 24th International …, 2023 - ieeexplore.ieee.org
Field programmable gate arrays (FPGAs) are widely used in critical applications such as
industrial, medical, automotive, and military systems due to their ability to be dynamically …

Using Look Up Table Content as Signatures to Identify IP Cores in Modern FPGAs

A Asghar, AK Robillard, I Tuzov, A Becher… - … on Architecture of …, 2022 - Springer
The increasing amount of logic resources in FPGA architectures has enabled the realization
of larger and more complex designs. Today, most of the large-scale designs rely heavily on …

Using Look Up Table Content as Signatures to Identify IP Cores in Modern FPGAs

D Ziener - Architecture of Computing Systems: 35th International …, 2022 - books.google.com
The increasing amount of logic resources in FPGA architectures has enabled the realization
of larger and more complex designs. Today, most of the large-scale designs rely heavily on …