A survey on machine learning against hardware trojan attacks: Recent advances and challenges
Z Huang, Q Wang, Y Chen, X Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
The remarkable success of machine learning (ML) in a variety of research domains has
inspired academic and industrial communities to explore its potential to address hardware …
inspired academic and industrial communities to explore its potential to address hardware …
A survey of network-on-chip security attacks and countermeasures
With the advances of chip manufacturing technologies, computer architects have been able
to integrate an increasing number of processors and other heterogeneous components on …
to integrate an increasing number of processors and other heterogeneous components on …
Evaluation approach for efficient countermeasure techniques against denial-of-service attack on MPSoC-based IoT using multi-criteria decision-making
AAJ Al-Hchaimi, NB Sulaiman, MAB Mustafa… - IEEE …, 2022 - ieeexplore.ieee.org
Context: Denial-of-Service Attack countermeasure techniques (DoS A-CTs) evaluation is a
Multi-criteria decision-making (MCDM) problem based on different MPSoCs of IoT platform …
Multi-criteria decision-making (MCDM) problem based on different MPSoCs of IoT platform …
Real-time detection and localization of distributed DoS attacks in NoC-based SoCs
Network-on-chip (NoC) is widely employed by multicore system-on-chip (SoC) architectures
to cater to their communication requirements. Increasing NoC complexity coupled with its …
to cater to their communication requirements. Increasing NoC complexity coupled with its …
A survey on the security of wired, wireless, and 3D network-on-chips
Network-on-Chips (NoCs) have been widely used as a scalable communication solution in
the design of multiprocessor system-on-chips (MPSoCs). NoCs enable communications …
the design of multiprocessor system-on-chips (MPSoCs). NoCs enable communications …
Lightweight and trust-aware routing in NoC-based SoCs
Increasing System-on-Chip (SoC) design complexity coupled with time-to-market constraints
have motivated manufacturers to integrate several third-party Intellectual Property (IP) cores …
have motivated manufacturers to integrate several third-party Intellectual Property (IP) cores …
Lightweight mitigation of hardware Trojan attacks in NoC-based manycore computing
VY Raparti, S Pasricha - Proceedings of the 56th Annual Design …, 2019 - dl.acm.org
Data-snooping is a serious security threat in NoC fabrics that can lead to theft of sensitive
information from applications executing on manycore processors. Hardware Trojans (HTs) …
information from applications executing on manycore processors. Hardware Trojans (HTs) …
Denial-of-service attack detection using machine learning in network-on-chip architectures
State-of-the-art System-on-Chip (SoC) designs consist of many Intellectual Property (IP)
cores that interact using a Network-on-Chip (NoC) architecture. SoC designers increasingly …
cores that interact using a Network-on-Chip (NoC) architecture. SoC designers increasingly …
EETD: An energy efficient design for runtime hardware trojan detection in untrusted network-on-chip
Network-on-chip (NoC) is a communication intellectual property (IP) core, popularly used in
the system-on-a-chip (SoC) designs. The NoC IP core often comes from an untrusted 3rd …
the system-on-a-chip (SoC) designs. The NoC IP core often comes from an untrusted 3rd …
Sniffer: A machine learning approach for DoS attack localization in NoC-based SoCs
Flooding-based Denial-of-service (DoS) attacks have been prevalent in Network-on-Chip
(NoC) architectures, due to its shared nature and open access to all the on-chip modules. A …
(NoC) architectures, due to its shared nature and open access to all the on-chip modules. A …