Resource-and workload-aware model parallelism-inspired novel malware detection for iot devices

S Kasarapu, S Shukla… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The wide adoption of Internet of Things (IoT) devices has led to better connectivity along with
seamless communication and smart computation capabilities across the network. Despite …

Data augmented hardware trojan detection using label spreading algorithm based transductive learning for edge computing-assisted IoT devices

V Sankar, MN Devi, M Jayakumar - IEEE Access, 2022 - ieeexplore.ieee.org
IoT devices handle a large amount of information including sensitive information pertaining
to the deployed application. Such a scenario, makes IoT devices susceptible to various …

A Zero Trust-based framework employed by Blockchain Technology and Ring Oscillator Physical Unclonable Functions for security of Field Programmable Gate Array …

A Kulkarni, NA Hazari, M Niamat - IEEE Access, 2024 - ieeexplore.ieee.org
The field programmable gate array (FPGA) supply chain is vulnerable to security issues from
untrusted participants involved, resulting in the significant research being conducted in this …

Circuit topology-aware vaccination-based hardware trojan detection

R Hassan, X Meng, K Basu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Hardware trojans (HTs) pose a critical security threat to modern integrated circuits (ICs)
through malicious activities, including leaking critical information, executing unauthorized …

Defense against on-chip trojans enabling traffic analysis attacks based on machine learning and data augmentation

A Dhavlle, MM Ahmed, N Mansoor… - … on Computer-Aided …, 2023 - ieeexplore.ieee.org
Modern computing systems involve huge data exchange across various sections of the
processing system. To facilitate this, network-on-chip (NoC) serves as a crucial infrastructure …

Design of secure and robust cognitive system for malware detection

S Shukla - arXiv preprint arXiv:2208.02310, 2022 - arxiv.org
Machine learning based malware detection techniques rely on grayscale images of malware
and tends to classify malware based on the distribution of textures in graycale images. Albeit …

Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications

S Chhabra, K Lata - Concurrency and Computation: Practice …, 2022 - Wiley Online Library
In semiconductor industry, reusability‐based System‐on‐Chip architecture using hardware
intellectual property (IP) cores play a prominent role in Internet‐of‐Things (IoT) applications …

Cut and forward: Safe and secure communication for FPGA system on chips

F Restuccia, R Kastner - IEEE Transactions on Computer-Aided …, 2022 - ieeexplore.ieee.org
Modern FPGA system on chips uses complex multimanager, multisubordinate on-chip
communication networks. Processor cores, hardware accelerators, DMA engines, and other …

An efficient framework with node filtering and load expansion for machine-learning-based hardware trojan detection

M Dong, W Pan, Z Qiu, Y Gao, X Qi, L Zheng - Electronics, 2022 - mdpi.com
The globalization of the integrated circuit (IC) industry has raised concerns about hardware
Trojans (HT), and there is an urgent need for efficient HT-detection methods of gate-level …

Reverse Engineering of Integrated Circuits: Tools and Techniques

A Dhavlle - arXiv preprint arXiv:2208.08689, 2022 - arxiv.org
Consumer and defense systems demanded design and manufacturing of electronics with
increased performance, compared to their predecessors. As such systems became …