Stealing neural network structure through remote FPGA side-channel analysis
Deep Neural Network (DNN) models have been extensively developed by companies for a
wide range of applications. The development of a customized DNN model with great …
wide range of applications. The development of a customized DNN model with great …
Hardware trojan detection using graph neural networks
The globalization of the Integrated Circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third party …
fabrication, and testing process from a single trusted entity to various untrusted third party …
HW2VEC: A graph learning tool for automating hardware security
The time-to-market pressure and continuous growing complexity of hardware designs have
promoted the globalization of the Integrated Circuit (IC) supply chain. However, such …
promoted the globalization of the Integrated Circuit (IC) supply chain. However, such …
Graph neural networks: A powerful and versatile tool for advancing design, reliability, and security of ICs
Graph neural networks (GNNs) have pushed the state-of-the-art (SOTA) for performance in
learning and predicting on large-scale data present in social networks, biology, etc. Since …
learning and predicting on large-scale data present in social networks, biology, etc. Since …
Embracing graph neural networks for hardware security
Graph neural networks (GNNs) have attracted increasing attention due to their superior
performance in deep learning on graph-structured data. GNNs have succeeded across …
performance in deep learning on graph-structured data. GNNs have succeeded across …
Golden reference-free hardware trojan localization using graph convolutional network
The globalization of the integrated circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third-party …
fabrication, and testing process from a single trusted entity to various untrusted third-party …
: Backdoor Attack on Graph Neural Networks-Based Hardware Security Systems
Graph neural networks (GNNs) have shown great success in detecting intellectual property
(IP) piracy and hardware Trojans (HTs). However, the machine learning community has …
(IP) piracy and hardware Trojans (HTs). However, the machine learning community has …
Analysis of third-party request structures to detect fraudulent websites
Third-party websites or applications are the key entities in the web eco-system that enable
websites to function and offer services. Almost every organization today uses dozens of …
websites to function and offer services. Almost every organization today uses dozens of …
A survey and perspective on artificial intelligence for security-aware electronic design automation
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly
used in several fields to improve performance and the level of automation. In recent years …
used in several fields to improve performance and the level of automation. In recent years …
Device-Bind Key-Storageless Hardware AI Model IP Protection: A PUF and Permute-Diffusion Encryption-Enabled Approach
Machine learning as a service (MLaaS) framework provides intelligent services or well-
trained artificial intelligence (AI) models for local devices. However, in the process of model …
trained artificial intelligence (AI) models for local devices. However, in the process of model …