In recent decades, due to the emerging requirements of computation
accel...
This paper presents a novel model training solution, denoted as
Adaptive...
Cloud computing paradigms have emerged as a major facility to store and
...
With the outsourcing of design flow, ensuring the security and
trustwort...
The globalization of the IC supply chain has raised many security threat...
In this paper, we propose a canonical prune-and-SAT (CP SAT) attack fo...
In this paper, we propose a novel solution to reduce the computational
c...
This paper proposes an ensemble learning model that is resistant to
adve...
In this paper, we introduce SCRAMBLE, as a novel logic locking solution ...
In this paper, we assess the security and testability of the state-of-th...
The resource-constrained nature of the Internet of Things (IoT) devices,...
In this paper, we introduce DFSSD, a novel logic locking solution for
se...
State-of-the-art attacks against cyclic logic obfuscation use satisfiabi...
In this paper, we introduce a Learning Assisted Side Channel delay Analy...
In this paper, we propose Code-Bridged Classifier (CBC), a framework for...
In this paper, we first propose the design of Temporal-Carry-deferring M...
In this paper, we present NESTA, a specialized Neural engine that
signif...
In this paper, we introduce a novel Communication and Obfuscation Manage...
The emergence of High-Level Synthesis (HLS) tools shifted the paradigm o...
To reduce the cost of ICs and to meet the market's demand, a considerabl...
In this paper, we investigate the strength of six different SAT solvers ...
In this work, we propose LUT-Lock, a novel Look-Up-Table-based netlist
o...
In this paper, we claim that cyclic obfuscation, when properly implement...