DBXplorer: enabling keyword search over relational databases
Figure 1 shows the various steps of the search component. Given a set of query keywords,
the system first uses the symbol table to determine the locations within the database where …
the system first uses the symbol table to determine the locations within the database where …
Logic locking for IP security: A comprehensive analysis on challenges, techniques, and trends
A substantial part of the Integrated Circuit (IC) supply chain that involves semiconductor
fabrication, packaging, and testing has shifted globally to minimize IC costs and satisfy …
fabrication, packaging, and testing has shifted globally to minimize IC costs and satisfy …
A survey of digital circuit testing in the light of machine learning
The insistent trend in today's nanoscale technology, to keep abreast of the Moore's law, has
been continually opening up newer challenges to circuit designers. With rapid downscaling …
been continually opening up newer challenges to circuit designers. With rapid downscaling …
Challenging the security of logic locking schemes in the era of deep learning: A neuroevolutionary approach
Logic locking is a prominent technique to protect the integrity of hardware designs
throughout the integrated circuit design and fabrication flow. However, in recent years, the …
throughout the integrated circuit design and fabrication flow. However, in recent years, the …
ReTrustFSM: toward RTL hardware obfuscation-a hybrid FSM approach
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain
threats, ie, IP piracy and overproduction. Many studies have evaluated numerous …
threats, ie, IP piracy and overproduction. Many studies have evaluated numerous …
Mitigating electrical-level attacks towards secure multi-tenant FPGAs in the cloud
A rising trend is the use of multi-tenant FPGAs, particularly in cloud environments, where
partial access to the hardware is given to multiple third parties. This leads to new types of …
partial access to the hardware is given to multiple third parties. This leads to new types of …
Deceptive logic locking for hardware integrity protection against machine learning attacks
Logic locking has emerged as a prominent key-driven technique to protect the integrity of
integrated circuits. However, novel machine-learning-based attacks have recently been …
integrated circuits. However, novel machine-learning-based attacks have recently been …
Reverse engineering camouflaged sequential circuits without scan access
M El Massad, S Garg… - 2017 IEEE/ACM …, 2017 - ieeexplore.ieee.org
Integrated circuit (IC) camouflaging is a promising technique to protect the design of a chip
from reverse engineering. However, recent work has shown that even camouflaged ICs can …
from reverse engineering. However, recent work has shown that even camouflaged ICs can …
Conflict-free colorings of simple geometric regions with applications to frequency assignment in cellular networks
Motivated by a frequency assignment problem in cellular networks, we introduce and study a
new coloring problem that we call minimum conflict-free coloring (min-CF-coloring). In its …
new coloring problem that we call minimum conflict-free coloring (min-CF-coloring). In its …
Net2: A graph attention network method customized for pre-placement net length estimation
Net length is a key proxy metric for optimizing timing and power across various stages of a
standard digital design flow. However, the bulk of net length information is not available until …
standard digital design flow. However, the bulk of net length information is not available until …