Evolutionary computation and machine learning in security

S Picek, D Jakobovic - Proceedings of the Genetic and Evolutionary …, 2022 - dl.acm.org
Stjepan Picek received his PhD in 2015 as a double doctorate under the supervision of Lejla
Batina, Elena Marchiori (Radboud University Nijmegen, The Netherlands), and Domagoj …

Evolutionary computation and machine learning in cryptology

S Picek, D Jakobovic - Proceedings of the Genetic and Evolutionary …, 2021 - dl.acm.org
6 Attacks on Ciphers-ML 7 Quantum Protocols-EC 8 Physically Unclonable Functions-EC,
ML 9 Hardware Trojans-EC, ML 10 Side-channel Analysis-ML, EC 11 Fault Injection-EC, ML …

Hardware Trojan prevention using memristor technology

TM Supon, R Rashidzadeh - Microprocessors and Microsystems, 2023 - Elsevier
The design of modern integrated circuits includes many steps and different entities providing
opportunities to adversaries for Trojan injection or IP (intellectual property) piracy at different …

[HTML][HTML] Towards trust hardware deployment of edge computing: mitigation of hardware trojans based on evolvable hardware

Z Li, J Wang, Z Huang, N Luo, Q Wang - Applied Sciences, 2022 - mdpi.com
Hardware Trojans (HTs) are malicious hardware components designed to leak confidential
information or cause the chip/circuit on which they are integrated to malfunction during …

EA-based Mitigation of Hardware Trojan Attacks in NoC of Coarse-Grained Reconfigurable Arrays

Z Li, J Wang, Z Huang, Q Wang - … International Conference on …, 2022 - ieeexplore.ieee.org
Coarse-Grained Reconfigurable Arrays (CGRA) im-plemented using FPGA are widely
applied due to the portability and compatibility. As an evolvable hardware (EHW) platform, it …

[PDF][PDF] Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing.

M Labafniya, SE Borujeni, R Saeidi - ISeCure, 2021 - academia.edu
Nowadays the security of the design is so important because of the different available
attacks to the system. the main aim of this paper is to improve the security of the circuit …

Automatic hardware trojan generation platforms in integrated circuits: A critical review

Y Fazea, F Mohammed… - 2021 International …, 2021 - ieeexplore.ieee.org
Hardware Trojan (HT) is a malicious program that can cause various kinds of effects related
to sensitive information leakage, changes in computer functionality, and Denial of Service …

Command Execution Bypassing Evasion Based on Win32Net Module

S Ye, W Qin, T Chen, D Ou… - Proceedings of the 2024 …, 2024 - books.google.com
Bottom layer API interface evasion technology is one of the core technologies in current
evasion technology and is also one of the leading technologies in network security. In order …

An Obfuscation Method Based on CFGLUTs for Security of FPGAs.

M Labafniya, SE Borujeni - ISeCure, 2021 - search.ebscohost.com
There are many different ways of securing FPGAs to prevent successful reverse
engineering. One of the common forms is obfuscation methods. In this paper, we proposed …

[PDF][PDF] ISeCure

M Labafniya, R Saeidi - sid.ir
There are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs
are used in many different applications, its security becomes an important concern …