Stealing neural network structure through remote FPGA side-channel analysis

Y Zhang, R Yasaei, H Chen, Z Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Deep Neural Network (DNN) models have been extensively developed by companies for a
wide range of applications. The development of a customized DNN model with great …

Brain-inspired golden chip free hardware trojan detection

S Faezi, R Yasaei, A Barua… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Since 2007, the use of side-channel measurements for detecting Hardware Trojan (HT) has
been extensively studied. However, the majority of works either rely on a golden chip, or …

Hardware trojan detection using graph neural networks

R Yasaei, L Chen, SY Yu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The globalization of the Integrated Circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third party …

HW2VEC: A graph learning tool for automating hardware security

SY Yu, R Yasaei, Q Zhou, T Nguyen… - … Oriented Security and …, 2021 - ieeexplore.ieee.org
The time-to-market pressure and continuous growing complexity of hardware designs have
promoted the globalization of the Integrated Circuit (IC) supply chain. However, such …

SiPGuard: run-time System-in-Package security monitoring via power noise variation

T Zhang, ML Rahman, HM Kamali… - … Transactions on Very …, 2023 - ieeexplore.ieee.org
As Moore's law comes to a crawl, advanced package and integration techniques become
increasingly crucial by allowing for the combination of fabricated silicon dies, so-called …

GNN4IP: Graph neural network for hardware intellectual property piracy detection

R Yasaei, SY Yu, EK Naeini… - 2021 58th ACM/IEEE …, 2021 - ieeexplore.ieee.org
Aggressive time-to-market constraints and enormous hardware design and fabrication costs
have pushed the semiconductor industry toward hardware Intellectual Properties (IP) core …

Golden reference-free hardware trojan localization using graph convolutional network

R Yasaei, S Faezi… - IEEE Transactions on Very …, 2022 - ieeexplore.ieee.org
The globalization of the integrated circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third-party …

Detection method of Golden Chip-Free Hardware Trojan based on the combination of ResNeXt structure and attention mechanism

S Chen, T Wang, Z Huang, X Hou - Computers & Security, 2023 - Elsevier
Since 2007, the use of side-channel data to detect hardware Trojans (HT) has been widely
studied. Machine learning methods are widely used in the detection of hardware Trojans …

A deep learning based malicious module identification using stacked sparse autoencoder network for VLSI circuit reliability

M Priyatharishini, MN Devi - Measurement, 2022 - Elsevier
The rate of development of technology and its associated security issues are increasing in
integrated circuit industry. This provides a space for implanting dormant nature of threats …

TrojanSAINT: Gate-level netlist sampling-based inductive learning for hardware Trojan detection

H Lashen, L Alrahis, J Knechtel… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
We propose TrojanSAINT, a graph neural network (GNN)-based hardware Trojan (HT)
detection scheme working at the gate level. Unlike prior GNN-based art, TrojanSAINT …