Ten years of hardware Trojans: a survey from the attacker's perspective

M Xue, C Gu, W Liu, S Yu… - IET Computers & Digital …, 2020 - Wiley Online Library
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …

A survey on hardware security of DNN models and accelerators

S Mittal, H Gupta, S Srivastava - Journal of Systems Architecture, 2021 - Elsevier
As “deep neural networks”(DNNs) achieve increasing accuracy, they are getting employed
in increasingly diverse applications, including security-critical applications such as medical …

Security of neural networks from hardware perspective: A survey and beyond

Q Xu, MT Arafin, G Qu - Proceedings of the 26th Asia and South Pacific …, 2021 - dl.acm.org
Recent advances in neural networks (NNs) and their applications in deep learning
techniques have made the security aspects of NNs an important and timely topic for …

Imperceptible misclassification attack on deep learning accelerator by glitch injection

W Liu, CH Chang, F Zhang… - 2020 57th ACM/IEEE …, 2020 - ieeexplore.ieee.org
The convergence of edge computing and deep learning empowers endpoint hardwares or
edge devices to perform inferences locally with the help of deep neural network (DNN) …

Fusion-on-field security and privacy preservation for IoT edge devices: Concurrent defense against multiple types of hardware trojan attacks

H Mohammed, SR Hasan, F Awwad - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) devices have connected millions of houses around the globe via the
internet. In the recent past, threats due to hardware Trojan (HT) in the integrated circuits (IC) …

Incentivized and secure blockchain-based firmware update and dissemination for autonomous vehicles

M Baza, J Baxter, N Lasla, M Mahmoud… - … Vehicles in Smart …, 2020 - taylorfrancis.com
This chapter explores an incentivized blockchain-based firmware update scheme tailored for
Autonomous Vehicles (AVs). As the number of autonomous vehicles increases, the security …

Security and privacy preservation for smart grid AMI using machine learning and cryptography

MM Badr - 2022 - search.proquest.com
In the smart grid's advanced metering infrastructure (AMI), smart meters (SMs) are deployed
at the customers' premises to report their electricity consumption readings to the electric …

Towards hardware trojan resilient design of convolutional neural networks

P Sun, B Halak, T Kazmierski - 2022 IEEE 35th International …, 2022 - ieeexplore.ieee.org
The use of hardware accelerators for convolutional neural networks (CNN) is on the rise due
to the popularity of artificial intelligence in autonomous vehicles, industrial control systems …

A scalable multilabel classification to deploy deep learning architectures for edge devices

TA Odetola, O Oderhohwo, SR Hasan - arXiv preprint arXiv:1911.02098, 2019 - arxiv.org
Convolution Neural Networks (CNN) have performed well in many applications such as
object detection, pattern recognition, video surveillance and so on. CNN carryout feature …

2l-3w: 2-level 3-way hardware–software co-verification for the mapping of convolutional neural network (cnn) onto fpga boards

TA Odetola, KM Groves, Y Mohammed, F Khalid… - SN Computer …, 2022 - Springer
FPGAs have become a popular choice for deploying Convolutional Neural Networks
(CNNs). As a result, many researchers have explored the deployment and mapping of CNN …