Hardware trojan detection using machine learning: A tutorial

KI Gubbi, B Saber Latibari, A Srikanth… - ACM Transactions on …, 2023 - dl.acm.org
With the growth and globalization of IC design and development, there is an increase in the
number of Designers and Design houses. As setting up a fabrication facility may easily cost …

Enabling Accelerators for Graph Computing

K Shivdikar - 2024 - search.proquest.com
Abstract The advent of Graph Neural Networks (GNNs) has revolutionized the field of
machine learning, offering a novel paradigm for learning on graph-structured data. Unlike …

A survey on machine learning in hardware security

TÇ Köylü, CR Wedig Reinbrecht… - ACM Journal on …, 2023 - dl.acm.org
Hardware security is currently a very influential domain, where each year countless works
are published concerning attacks against hardware and countermeasures. A significant …

On the robustness of graph reduction against GNN backdoor

Y Zhu, M Mandulak, K Wu, G Slota, Y Jeon… - Proceedings of the …, 2024 - dl.acm.org
Graph Neural Networks (GNNs) have been shown to be susceptible to backdoor poisoning
attacks, which pose serious threats to real-world applications. Meanwhile, graph reduction …

Quantum machine learning for material synthesis and hardware security

C Beaudoin, S Kundu, RO Topaloglu… - Proceedings of the 41st …, 2022 - dl.acm.org
Using quantum computing, this paper addresses two scientifically-pressing and day to day-
relevant problems, namely, chemical retrosynthesis which is an important step in …

An efficient ml-based hardware trojan localization framework for rtl security analysis

R Fan, Y Tang, H Sun, J Liu, H Li - Proceedings of the 2024 ACM/IEEE …, 2024 - dl.acm.org
Recently, the scale of IC designs has been growing rapidly. Due to the popularity of
untrusted third-party EDA tools and IP cores, IC designs face the risk of being infected by …

LEGO: Empowering Chip-Level Functionality Plug-and-Play for Next-Generation IoT Devices

C Zhang, S Li, Y Song, Q Meng, M Chen… - Proceedings of the 28th …, 2023 - dl.acm.org
Versatile Internet of Things (IoT) applications call for re-configurable IoT devices that can
easily extend new functionality on demand. However, the heterogeneity of functional chips …

Netwise Detection of Hardware Trojans Using Scalable Convolution of Graph Embedding Clouds

D Utyamishev, I Partin-Vaisband - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Hardware Trojans (HTs) are malicious circuits that can be inserted into integrated circuits
(ICs) during the design, manufacturing, or packaging phases. HTs can cause a variety of …

Hardware Trojan Detection Based on Circuit Sequence Features with GRU Neural Network

Z Li, Y Zhang, X Hu, S Li, B Liang - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
The globalization of the IC industry has led to hardware designers commonly adopting Third-
Party Intellectual Property cores (3PIPs) to reduce design costs and time. However, over …

Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms

W Fu, H Yu, O Arias, K Yang, Y Jin, T Yavuz… - Proceedings of the Great …, 2022 - dl.acm.org
The rapid growth of the Internet of Things (IoT) industry has increased the demand for
intellectual property (IP) cores. Increasing numbers of third-party vendors have raised …