Logic locking protects the integrity of hardware designs throughout the
...
We propose FPGA-Patch, the first-of-its-kind defense that leverages auto...
The participation of third-party entities in the globalized semiconducto...
Graph neural networks (GNNs) have shown great success in detecting
intel...
Extracting the architecture of layers of a given deep neural network (DN...
Oracle-less machine learning (ML) attacks have broken various logic lock...
We propose TrojanSAINT, a graph neural network (GNN)-based hardware Troj...
Graph neural networks (GNNs) have pushed the state-of-the-art (SOTA) for...
Power side-channel (PSC) attacks are well-known threats to sensitive har...
Due to cost benefits, supply chains of integrated circuits (ICs) are lar...
As industry moves toward chiplet-based designs, the insertion of hardwar...
Logic locking protects an IC from threats such as piracy of design IP an...
The globalization of the Integrated Circuit (IC) market is attracting an...
Graph neural networks (GNNs) have attracted increasing attention due to ...
Process variations and device aging impose profound challenges for circu...
The advancements of deep neural networks (DNNs) have led to their deploy...
Logic locking has received considerable interest as a prominent techniqu...
Logic locking aims to prevent intellectual property (IP) piracy and
unau...
Industry is moving towards large-scale system-on-chip (SoC) designs wher...
Logic locking aims to protect the intellectual property (IP) of integrat...
In this paper, we propose GNNUnlock, the first-of-its-kind oracle-less
m...
Dedicated, after acceptance and publication, in memory of the late Vasso...
Side-channel attacks have empowered bypassing of cryptographic component...
Integrated circuits (ICs) are the foundation of all computing systems. T...
Outsourcing in semiconductor industry opened up venues for faster and
co...
While financially advantageous, outsourcing key steps, such as testing, ...
Split manufacturing (SM) and layout camouflaging (LC) are two promising
...
The security of logic locking has been called into question by various
a...
We review threats and selected schemes concerning hardware security at d...
Leveraging 2.5D interposer technology, we advocate the integration of
un...
Protecting intellectual property (IP) has become a serious challenge for...
Split manufacturing was introduced as an effective countermeasure agains...
The increasing cost of integrated circuit (IC) fabrication has driven mo...
With the globalization of manufacturing and supply chains, ensuring the
...
Hardware-centric security threats have emerged in every stage of the IC
...
Split manufacturing (SM) seeks to protect against piracy of intellectual...
Protecting intellectual property (IP) in electronic circuits has become ...
Here we advance the protection of split manufacturing (SM)-based layouts...
Layout camouflaging (LC) is a promising technique to protect chip design...