A survey and perspective on artificial intelligence for security-aware electronic design automation

D Koblah, R Acharya, D Capecci… - ACM Transactions on …, 2023 - dl.acm.org
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly
used in several fields to improve performance and the level of automation. In recent years …

Challenges and opportunities of security-aware EDA

J Feldtkeller, P Sasdrich, T Güneysu - ACM Transactions on Embedded …, 2023 - dl.acm.org
The foundation of every digital system is based on hardware in which security, as a core
service of many applications, should be deeply embedded. Unfortunately, the knowledge of …

A novel design flow for a security-driven synthesis of side-channel hardened cryptographic modules

SA Huss, O Stein - Journal of Low Power Electronics and Applications, 2017 - mdpi.com
Over the last few decades, computer-aided engineering (CAE) tools have been developed
and improved in order to ensure a short time-to-market in the chip design business. Up to …

Amasive: an adaptable and modular autonomous side-channel vulnerability evaluation framework

SA Huss, M Stöttinger, M Zohner - … and Cryptography: Papers in Honor of …, 2013 - Springer
Over the last decades computer aided engineering (CAE) tools have been developed and
improved in order to ensure a short time-to-market in the chip design business. Up to now …

Side-channel leakage assessment metrics and methodologies at design cycle: a case study for a cryptosystem

VS Bokharaie, A Jahanian - Journal of Information Security and …, 2020 - Elsevier
Current EDA (electronic design automation) tools are not capable to consider side-channel
vulnerabilities at design time. Therefore, designers should manage such security …

CASCA: A design automation approach for designing hardware countermeasures against side-channel attacks

L Delledonne, V Zaccaria, R Susella, G Bertoni… - ACM Transactions on …, 2018 - dl.acm.org
Implementing a cryptographic circuit poses challenges not always acknowledged in the
backing mathematical theory. One of them is the vulnerability against side-channel attacks …

[PDF][PDF] A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation

S TAJIK, F GANJI, DL WOODARD, D FORTE - 2022 - researchgate.net
Authors' addresses: David Selasi Koblah, dkoblah@ ul. edu; Rabin Yu Acharya, rabin.
acharya@ ul. edu; Daniel Capecci; Olivia P. Dizon-Paradis, Florida Institute for …

Formal verification and automated masking of cryptographic hardware

D Knichel - 2023 - hss-opus.ub.ruhr-unibochum.de
RUB-Repository - Formal verification and automated masking of cryptographic hardware
Deutsch OPUS UB Bochum RUB » Bibliotheksportal Home Search Browse Publish FAQ …