Blockchain-assisted UAV communication systems: A comprehensive survey
Unmanned aerial vehicles (UAVs) have recently established their capacity to provide cost-
effective and credible solutions for various real-world scenarios. UAVs provide an immense …
effective and credible solutions for various real-world scenarios. UAVs provide an immense …
Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives
In the context of hardware trust and assurance, reverse engineering has been often
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …
A survey on security and privacy issues of UAVs
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs),
has witnessed a rapid increase with its large number of airspace users. The tremendous …
has witnessed a rapid increase with its large number of airspace users. The tremendous …
Hal—the missing piece of the puzzle for hardware reverse engineering, trojan detection and insertion
M Fyrbiak, S Wallat, P Swierczynski… - … on Dependable and …, 2018 - ieeexplore.ieee.org
Hardware manipulations pose a serious threat to numerous systems, ranging from a myriad
of smart-X devices to military systems. In many attack scenarios an adversary merely has …
of smart-X devices to military systems. In many attack scenarios an adversary merely has …
A survey on hardware vulnerability analysis using machine learning
Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to
support its core functionalities. A typical SoC consists of diverse components gathered from …
support its core functionalities. A typical SoC consists of diverse components gathered from …
On the difficulty of FSM-based hardware obfuscation
M Fyrbiak, S Wallat, J Déchelotte, N Albartus… - IACR Transactions on …, 2018 - tches.iacr.org
Abstract In today's Integrated Circuit (IC) production chains, a designer's valuable
Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to …
Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to …
A survey of algorithmic methods in IC reverse engineering
The discipline of reverse engineering integrated circuits (ICs) is as old as the technology
itself. It grew out of the need to analyze competitor's products and detect possible IP …
itself. It grew out of the need to analyze competitor's products and detect possible IP …
Dana-universal dataflow analysis for gate-level netlist reverse engineering
Reverse engineering of integrated circuits, ie, understanding the internals of IC, is required
for many benign and malicious applications. Examples of the former are detection of patent …
for many benign and malicious applications. Examples of the former are detection of patent …
Graph similarity and its applications to hardware security
M Fyrbiak, S Wallat, S Reinhard… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Hardware reverse engineering is a powerful and universal tool for both security engineers
and adversaries. From a defensive perspective, it allows for detection of intellectual property …
and adversaries. From a defensive perspective, it allows for detection of intellectual property …
[HTML][HTML] A survey on security analysis of machine learning-oriented hardware and software intellectual property
Intellectual Property (IP) includes ideas, innovations, methodologies, works of authorship
(viz., literary and artistic works), emblems, brands, images, etc. This property is intangible …
(viz., literary and artistic works), emblems, brands, images, etc. This property is intangible …