A comprehensive survey on non-invasive fault injection attacks

AM Shuvo, T Zhang, F Farahmandi… - Cryptology ePrint …, 2023 - eprint.iacr.org
Non-invasive fault injection attacks have emerged as significant threats to a spectrum of
microelectronic systems ranging from commodity devices to high-end customized …

Sofi: Security property-driven vulnerability assessments of ics against fault-injection attacks

H Wang, H Li, F Rahman… - … on Computer-Aided …, 2021 - ieeexplore.ieee.org
Fault-injection attacks have become a major concern for hardware designs, primarily due to
their powerful capability in tampering with critical locations in a device to cause violation of …

Fuzz, penetration, and ai testing for soc security verification: Challenges and solutions

KZ Azar, MM Hossain, A Vafaei, H Al Shaikh… - Cryptology ePrint …, 2022 - eprint.iacr.org
The ever-increasing usage and application of system-on-chips (SoCs) has resulted in the
tremendous modernization of these architectures. For a modern SoC design, with the …

System-on-chip security

F Farahmandi, Y Huang, P Mishra - Cham, Switzerland: Springer, 2020 - Springer
We are living in a connected world, where a wide variety of computing and sensing
components interact with each other. Secure computation and trusted communication are …

RTL-PSC: Automated power side-channel leakage assessment at register-transfer level

M He, J Park, A Nahiyan, A Vassilev… - 2019 IEEE 37th VLSI …, 2019 - ieeexplore.ieee.org
Power side-channel attacks (SCAs) have become a major concern to the security community
due to their noninvasive feature, low-cost, and effectiveness in extracting secret information …

[PDF][PDF] SoC Security Properties and Rules.

N Farzana, F Farahmandi… - IACR Cryptol. ePrint …, 2021 - iacr.steepath.eu
A system-on-chip (SoC) security can be weakened by exploiting the potential vulnerabilities
of the intellectual property (IP) cores used to implement the design and interaction among …

Soc security verification using property checking

N Farzana, F Rahman, M Tehranipoor… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Security of a system-on-chip (SoC) can be weakened by exploiting the inherent and
potential vulnerabilities of the intellectual property (IP) cores used to implement the design …

Empowering hardware security with llm: The development of a vulnerable hardware database

D Saha, K Yahyaei, SK Saha… - … Security and Trust …, 2024 - ieeexplore.ieee.org
The scarcity of comprehensive databases and bench-marks in hardware design specifically
tailored for security tasks is a significant challenge in the community. Such databases are …

Scalable hardware trojan activation by interleaving concrete simulation and symbolic execution

A Ahmed, F Farahmandi, Y Iskander… - … IEEE International Test …, 2018 - ieeexplore.ieee.org
Intellectual Property (IP) based System-on-Chip (SoC) design is a widely used practice
today. The IPs gathered from third-party vendors may not be trustworthy since they may …

A survey and perspective on artificial intelligence for security-aware electronic design automation

D Koblah, R Acharya, D Capecci… - ACM Transactions on …, 2023 - dl.acm.org
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly
used in several fields to improve performance and the level of automation. In recent years …