Stealing neural network structure through remote FPGA side-channel analysis
Deep Neural Network (DNN) models have been extensively developed by companies for a
wide range of applications. The development of a customized DNN model with great …
wide range of applications. The development of a customized DNN model with great …
Brain-inspired golden chip free hardware trojan detection
Since 2007, the use of side-channel measurements for detecting Hardware Trojan (HT) has
been extensively studied. However, the majority of works either rely on a golden chip, or …
been extensively studied. However, the majority of works either rely on a golden chip, or …
Hardware trojan detection using graph neural networks
The globalization of the Integrated Circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third party …
fabrication, and testing process from a single trusted entity to various untrusted third party …
HW2VEC: A graph learning tool for automating hardware security
The time-to-market pressure and continuous growing complexity of hardware designs have
promoted the globalization of the Integrated Circuit (IC) supply chain. However, such …
promoted the globalization of the Integrated Circuit (IC) supply chain. However, such …
SiPGuard: run-time System-in-Package security monitoring via power noise variation
As Moore's law comes to a crawl, advanced package and integration techniques become
increasingly crucial by allowing for the combination of fabricated silicon dies, so-called …
increasingly crucial by allowing for the combination of fabricated silicon dies, so-called …
GNN4IP: Graph neural network for hardware intellectual property piracy detection
Aggressive time-to-market constraints and enormous hardware design and fabrication costs
have pushed the semiconductor industry toward hardware Intellectual Properties (IP) core …
have pushed the semiconductor industry toward hardware Intellectual Properties (IP) core …
Golden reference-free hardware trojan localization using graph convolutional network
R Yasaei, S Faezi… - IEEE Transactions on Very …, 2022 - ieeexplore.ieee.org
The globalization of the integrated circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third-party …
fabrication, and testing process from a single trusted entity to various untrusted third-party …
Detection method of Golden Chip-Free Hardware Trojan based on the combination of ResNeXt structure and attention mechanism
S Chen, T Wang, Z Huang, X Hou - Computers & Security, 2023 - Elsevier
Since 2007, the use of side-channel data to detect hardware Trojans (HT) has been widely
studied. Machine learning methods are widely used in the detection of hardware Trojans …
studied. Machine learning methods are widely used in the detection of hardware Trojans …
A deep learning based malicious module identification using stacked sparse autoencoder network for VLSI circuit reliability
M Priyatharishini, MN Devi - Measurement, 2022 - Elsevier
The rate of development of technology and its associated security issues are increasing in
integrated circuit industry. This provides a space for implanting dormant nature of threats …
integrated circuit industry. This provides a space for implanting dormant nature of threats …
TrojanSAINT: Gate-level netlist sampling-based inductive learning for hardware Trojan detection
H Lashen, L Alrahis, J Knechtel… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
We propose TrojanSAINT, a graph neural network (GNN)-based hardware Trojan (HT)
detection scheme working at the gate level. Unlike prior GNN-based art, TrojanSAINT …
detection scheme working at the gate level. Unlike prior GNN-based art, TrojanSAINT …