The various benefits of multi-tenanting, such as higher device utilizati...
Graph neural networks (GNNs) have shown great success in detecting
intel...
Logic locking protects an IC from threats such as piracy of design IP an...
Reinforcement learning (RL) is a machine learning paradigm where an
auto...
Stealthy hardware Trojans (HTs) inserted during the fabrication of integ...
Insertion of hardware Trojans (HTs) in integrated circuits is a pernicio...
Graph neural networks (GNNs) have attracted increasing attention due to ...
Logic locking has received considerable interest as a prominent techniqu...
Logic locking aims to prevent intellectual property (IP) piracy and
unau...
Logic locking aims to protect the intellectual property (IP) of integrat...
In this paper, we propose GNNUnlock, the first-of-its-kind oracle-less
m...
Dedicated, after acceptance and publication, in memory of the late Vasso...
Side-channel attacks have empowered bypassing of cryptographic component...
Split manufacturing (SM) and layout camouflaging (LC) are two promising
...
We review threats and selected schemes concerning hardware security at d...
Leveraging 2.5D interposer technology, we advocate the integration of
un...
Protecting intellectual property (IP) has become a serious challenge for...
The increasing cost of integrated circuit (IC) fabrication has driven mo...
With the globalization of manufacturing and supply chains, ensuring the
...
Hardware-centric security threats have emerged in every stage of the IC
...
Split manufacturing (SM) seeks to protect against piracy of intellectual...
Protecting intellectual property (IP) in electronic circuits has become ...
Here we advance the protection of split manufacturing (SM)-based layouts...
Layout camouflaging (LC) is a promising technique to protect chip design...