Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2 Hits in 4.0 sec

Graph Similarity and Its Applications to Hardware Security

Marc Fyrbiak, Sebastian Wallat, Sascha Reinhard, Nicolai Bissantz, Christof Paar
2019 IEEE transactions on computers  
Third, in three extensively evaluated case studies, namely (1) gate-level netlist reverse engineering, (2) hardware Trojan detection, and (3) assessment of hardware obfuscation, we demonstrate the practical  ...  From a defensive perspective, it allows for detection of intellectual property infringements and hardware Trojans, while it simultaneously can be used for product piracy and malicious circuit manipulations  ...  Science Foundation (NSF) award CNS-1563829, by the German Federal Ministry of Education and Research (BMBF Grant 16KIS0820 emproof and MED4D, part project 05M16PCA).  ... 
doi:10.1109/tc.2019.2953752 fatcat:g4aye6r77rbdvoyuwwpnxsa3pq

Two Sides of the Same Coin: Boons and Banes of Machine Learning in Hardware Security

Wenye Liu, Chip-Hong Chang, Xueyang Wang, Chen Liu, Jason Fung, Mohammad Ebrahimabadi, Naghmeh Karimi, Xingyu Meng, Kanad Basu
2021 IEEE Journal on Emerging and Selected Topics in Circuits and Systems  
ML schemes have been extensively used to enhance the security and trust of embedded systems like hardware Trojans and malware detection.  ...  On the other hand, ML-based approaches have also been adopted by adversaries to assist side-channel attacks, reverse engineer integrated circuits and break hardware security primitives like Physically  ...  Controllability and Observability for hardware Trojan Detection (COTD) [89] uses unsupervised k-means clustering to isolate Trojan signals based on the controllability and observability analysis of gate-level  ... 
doi:10.1109/jetcas.2021.3084400 fatcat:c4wdkghpo5fwbhvkekaysnahzm