A Abel, J Reineke - 2015 IEEE/ACM International Conference …, 2015 - ieeexplore.ieee.org
In this paper, we take a fresh look at a well-known NP-complete problem-the exact minimization of incompletely specified Mealy machines. Most existing exact techniques in …
W Liang, W Huang, W Chen, KC Li, K Li - Sensors, 2019 - mdpi.com
Rapid advances in the Internet-of-Things (IoT) have exposed the underlying hardware devices to security threats. As the major component of hardware devices, the integrated …
A Abel - 2020 - publikationen.sulb.uni-saarland.de
Detailed microarchitectural models are necessary to predict, explain, or optimize the performance of software running on modern microprocessors. Building such models often …
Y Huang, W Liang, J Long, J Xu… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
With the rapid development of Internet-of-Things (IoT), hardware security becomes an important issue. Once a chip is attacked, the authentication always faces serious credibility …
This paper presents an improved watermarking scheme for soft Intellectual Property (IP)- Cores using Genetic Algorithms (GAs). For this purpose, a watermark signature and an IP …
M Lewandowski, S Katkoori - 20th International Symposium on …, 2019 - ieeexplore.ieee.org
We propose an extended Darwinian Genetic Algorithm that builds upon the traditional genetic algorithm in the efforts to more accurately depict the process of natural selection We …
Over the last two decades or so, VLSI hardware is increasingly subject to sophisticated attacks on both the supply chain and design fronts. There is no explicit trust that the …
With the global spanning of integrated circuit (IC) and electronic device supply chains, the ability of an untrusted foundry to alter a design for intellectual property (IP)/IC piracy …
(IoT), hardware security becomes an important issue. Once a chip is attacked, the authentication always faces serious credibility crisis. In this work, a Hausdorff distance …