Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2023
HT-EMIS: A Deep Learning Tool for Hardware Trojan Detection and Identification through Runtime EM Side-Channels
GLSVLSI '23: Proceedings of the Great Lakes Symposium on VLSI 2023Pages 51–56https://doi.org/10.1145/3583781.3590260Hardware Trojans (HTs) are malicious circuits planted in Integrated Circuits (ICs). Multiple techniques using Side-Channel signals to detect HTs have been developed over the past decade. However, most of this research focuses on HT detection. Few of them ...
- research-articleJanuary 2023
Hardware Trojan Detection and High-Precision Localization in NoC-Based MPSoC Using Machine Learning
ASPDAC '23: Proceedings of the 28th Asia and South Pacific Design Automation ConferencePages 516–521https://doi.org/10.1145/3566097.3567922Networks-on-Chips (NoC) based Multi-Processor System-on-Chip (MPSoC) are increasingly employed in industrial and consumer electronics. Outsourcing third-party IPs (3PIPs) and tools in NoC-based MPSoC is a prevalent development way in most fabless ...
- research-articleJanuary 2023
Trojan-D2: Post-Layout Design and Detection of Stealthy Hardware Trojans - A RISC-V Case Study
ASPDAC '23: Proceedings of the 28th Asia and South Pacific Design Automation ConferencePages 683–689https://doi.org/10.1145/3566097.3567919With the exponential increase in the popularity of the RISC-V ecosystem, the security of this platform must be re-evaluated especially for mission-critical and IoT devices. Besides, the insertion of a Hardware Trojan (HT) into a chip after the in-house ...
- invited-talkDecember 2022
Quantum Machine Learning for Material Synthesis and Hardware Security (Invited Paper)
ICCAD '22: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided DesignArticle No.: 120, Pages 1–7https://doi.org/10.1145/3508352.3561115Using quantum computing, this paper addresses two scientifically-pressing and day to day-relevant problems, namely, chemical retrosynthesis which is an important step in drug/material discovery and security of semiconductor supply chain. We show that ...
- research-articleJune 2022
Hardware Security in Advanced Manufacturing
GLSVLSI '22: Proceedings of the Great Lakes Symposium on VLSI 2022Pages 469–474https://doi.org/10.1145/3526241.3530829More and more digitized techniques and network connectivity are deployed to advanced manufacturing to enable remote system monitoring and automated production; however, this trend also leads to the traditional assumption of security in manufacturing not ...
-
- research-articleOctober 2021
Packet header attack by hardware trojan in NoC based TCMP and its impact analysis
NOCS '21: Proceedings of the 15th IEEE/ACM International Symposium on Networks-on-ChipPages 21–28https://doi.org/10.1145/3479876.3481597With the advancement of VLSI technology, Tiled Chip Multicore Processors (TCMP) with packet switched Network-on-Chip (NoC) have been emerged as the backbone of the modern data intensive parallel systems. Due to tight time-to-market constraints, ...
- short-paperOctober 2021
Securing network-on-chips via novel anonymous routing
NOCS '21: Proceedings of the 15th IEEE/ACM International Symposium on Networks-on-ChipPages 29–34https://doi.org/10.1145/3479876.3481592Network-on-Chip (NoC) is widely used as an efficient communication architecture in multi-core and many-core System-on-Chips (SoCs). However, the shared communication resources in NoCs, e.g., channels, buffers, and routers might be used to conduct ...
- research-articleJune 2021
Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspectives
- Ulbert J. Botero,
- Ronald Wilson,
- Hangwei Lu,
- Mir Tanjidur Rahman,
- Mukhil A. Mallaiyan,
- Fatemeh Ganji,
- Navid Asadizanjani,
- Mark M. Tehranipoor,
- Damon L. Woodard,
- Domenic Forte
ACM Journal on Emerging Technologies in Computing Systems (JETC), Volume 17, Issue 4Article No.: 62, Pages 1–53https://doi.org/10.1145/3464959In the context of hardware trust and assurance, reverse engineering has been often considered as an illegal action. Generally speaking, reverse engineering aims to retrieve information from a product, i.e., integrated circuits (ICs) and printed circuit ...
- research-articleJanuary 2021
Security of Neural Networks from Hardware Perspective: A Survey and Beyond
ASPDAC '21: Proceedings of the 26th Asia and South Pacific Design Automation ConferencePages 449–454https://doi.org/10.1145/3394885.3431639Recent advances in neural networks (NNs) and their applications in deep learning techniques have made the security aspects of NNs an important and timely topic for fundamental research. In this paper, we survey the security challenges and opportunities ...
- research-articleMarch 2020
How Secure Is Split Manufacturing in Preventing Hardware Trojan?
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 25, Issue 2Article No.: 20, Pages 1–23https://doi.org/10.1145/3378163With the trend of outsourcing fabrication, split manufacturing is regarded as a promising way to both acquire the high-end nodes in untrusted external foundries and protect the design from potential attackers. However, in this article, we show that ...
- research-articleNovember 2019
Breaking TrustZone Memory Isolation through Malicious Hardware on a Modern FPGA-SoC
ASHES'19: Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security WorkshopPages 3–12https://doi.org/10.1145/3338508.3359568FPGA-SoCs are heterogeneous computing systems consisting of reconfigurable hardware and high performance processing units. This combination enables a flexible design methodology for embedded systems. However, the sharing of resources between these ...
- posterOctober 2019
Detection and prevention protocol for black hole attack in network-on-chip
NOCS '19: Proceedings of the 13th IEEE/ACM International Symposium on Networks-on-ChipArticle No.: 22, Pages 1–2https://doi.org/10.1145/3313231.3352374Network-on-Chip (NoC) has become exposed to security threats. It can be infected with a Hardware Trojan (HT) to degrade the system performance and apply a denial of service attack. In this paper, we proposed a new HT-based threat model, known as Black ...
- panelMay 2019
Solving Energy and Cybersecurity Constraints in IoT Devices Using Energy Recovery Computing
GLSVLSI '19: Proceedings of the 2019 Great Lakes Symposium on VLSIPages 525–530https://doi.org/10.1145/3299874.3319337With the growth of Internet-of-Things (IoT), the potential threat vectors for malicious cyber and hardware attacks are rapidly expanding. As the IoT paradigm emerges, there are challenging requirements to design energy-efficient and secure systems. To ...
- short-paperJanuary 2019
Effect of sign-bit-flipping trojan on turbo coded communication systems
ICDCN '19: Proceedings of the 20th International Conference on Distributed Computing and NetworkingPages 502–505https://doi.org/10.1145/3288599.3295586In complex systems like 'Internet of Things' and 'Cyber Physical Systems', reliable communication is made possible by the use of error control codes like turbo codes. Such systems are vulnerable to attack by Trojans during the design or fabrication ...
- research-articleNovember 2017
Why you should care about don't cares: exploiting internal don't care conditions for hardware trojans
Hardware Trojans are a significant security threat due to the globalization of hardware design and supply chain. We demonstrate a new type of hardware Trojan hidden behind internal don't care conditions. The proposed Trojans can pass through formal ...
- research-articleOctober 2017
Standardizing Bad Cryptographic Practice: A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual Property
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityPages 1533–1546https://doi.org/10.1145/3133956.3134040We provide an analysis of IEEE standard P1735, which describes methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP. We find a surprising number of cryptographic mistakes in the ...
- research-articleOctober 2017
Provably-Secure Logic Locking: From Theory To Practice
- Muhammad Yasin,
- Abhrajit Sengupta,
- Mohammed Thari Nabeel,
- Mohammed Ashraf,
- Jeyavijayan (JV) Rajendran,
- Ozgur Sinanoglu
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityPages 1601–1618https://doi.org/10.1145/3133956.3133985Logic locking has been conceived as a promising proactive defense strategy against intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and overbuilding attacks. Yet, various attacks that use a working chip as an ...
- research-articleMarch 2017
Evaluating coherence-exploiting hardware trojan
Increasing complexity of integrated circuits and IP-based hardware designs have created the risk of hardware Trojans. This paper introduces a new type of threat, a coherence-exploiting hardware Trojan. This Trojan can be maliciously implanted in master ...
- posterFebruary 2017
Automatic Generation of Hardware Sandboxes for Trojan Mitigation in Systems on Chip (Abstract Only)
FPGA '17: Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate ArraysPage 289https://doi.org/10.1145/3020078.3021774Component based design is one of the preferred methods to tackle system complexity, and reduce costs and time-to-market. Major parts of the system design and IC production are outsourced to facilities distributed across the globe, thus opening the door ...
- short-paperMay 2016
Secure Model Checkers for Network-on-Chip (NoC) Architectures
GLSVLSI '16: Proceedings of the 26th edition on Great Lakes Symposium on VLSIPages 45–50https://doi.org/10.1145/2902961.2903032As chip multiprocessors (CMPs) are becoming more susceptible to process variation, crosstalk, and hard and soft errors, emerging threats from rogue employees in a compromised foundry are creating new vulnerabilities that could undermine the integrity of ...