Directed test generation for hardware validation: A survey

A Jayasena, P Mishra - ACM Computing Surveys, 2024‏ - dl.acm.org
The complexity of hardware designs has increased over the years due to the rapid
advancement of technology coupled with the need to support diverse and complex features …

Survey of recent developments for hardware trojan detection

A Jain, Z Zhou, U Guin - 2021 ieee international symposium on …, 2021‏ - ieeexplore.ieee.org
The outsourcing of the design and manufacturing of Integrated Circuits (ICs) poses a severe
threat to our critical infrastructures as an adversary can exploit them by bypassing the …

Hardware trojan detection using graph neural networks

R Yasaei, L Chen, SY Yu… - IEEE Transactions on …, 2022‏ - ieeexplore.ieee.org
The globalization of the integrated circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third-party …

System-on-chip security

F Farahmandi, Y Huang, P Mishra - Cham, Switzerland: Springer, 2020‏ - Springer
We are living in a connected world, where a wide variety of computing and sensing
components interact with each other. Secure computation and trusted communication are …

An automated configurable Trojan insertion framework for dynamic trust benchmarks

J Cruz, Y Huang, P Mishra… - 2018 Design, Automation …, 2018‏ - ieeexplore.ieee.org
Malicious hardware modification, also known as hardware Trojan attack, has emerged as a
serious security concern for electronic systems. Such attacks compromise the basic premise …

Security-aware FSM design flow for identifying and mitigating vulnerabilities to fault attacks

A Nahiyan, F Farahmandi, P Mishra… - … on Computer-aided …, 2018‏ - ieeexplore.ieee.org
The security of a system-on-chip (SoC) can be compromised by exploiting the vulnerabilities
of the finite state machines (FSMs) in the SoC controller modules through fault injection …

Test generation using reinforcement learning for delay-based side-channel analysis

Z Pan, J Sheldon, P Mishra - … of the 39th International Conference on …, 2020‏ - dl.acm.org
Reliability and trustworthiness are dominant factors in designing System-on-Chips (SoCs)
for a variety of applications. Malicious implants, such as hardware Trojans, can lead to …

Scalable hardware trojan activation by interleaving concrete simulation and symbolic execution

A Ahmed, F Farahmandi, Y Iskander… - … IEEE International Test …, 2018‏ - ieeexplore.ieee.org
Intellectual Property (IP) based System-on-Chip (SoC) design is a widely used practice
today. The IPs gathered from third-party vendors may not be trustworthy since they may …

A survey and perspective on artificial intelligence for security-aware electronic design automation

D Koblah, R Acharya, D Capecci… - ACM Transactions on …, 2023‏ - dl.acm.org
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly
used in several fields to improve performance and the level of automation. In recent years …

Device-specific security challenges and solution in IoT edge computing: a review

A Roy, J Kokila, N Ramasubramanian… - The Journal of …, 2023‏ - Springer
Rapid growth in IoT technology demands the need for the emergence of new IoT devices.
IoT devices vary in terms of shape, size, storage, battery life, and computational power …