CAD for Assurance of Electronic Systems
 

Publications

127 entries « 1 of 3 »

2023

Sengupta, Anirban; Chaurasia, Rahul; Anshul, Aditya

Robust Security of Hardware Accelerators Using Protein Molecular Biometric Signature and Facial Biometric Encryption Key Journal Article

In: IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 31, no. 6, pp. 826–839, 2023.

Links | BibTeX | Tags:

2022

Cruz, Jonathan; Posada, Christopher; Masna, Naren Vikram Raj; Chakraborty, Prabuddha; Gaikwad, Pravin; Bhunia, Swarup

A Framework for Automated Exploration of Trojan Attack Space in FPGA Netlists Miscellaneous

2022.

Links | BibTeX | Tags:

Cruz, Jonathan; Gaikwad, Pravin; Nair, Abhishek; Chakraborty, Prabuddha; Bhunia, Swarup

Automatic Hardware Trojan Insertion using Machine Learning Journal Article

In: arXiv preprint arXiv:2204.08580, 2022.

BibTeX | Tags:

2021

Hu, Yinghua; Zhang, Yuke; Yang, Kaixin; Chen, Dake; Beerel, Peter A.; Nuzzo, Pierluigi

Fun-SAT: Functional Corruptibility-Guided SAT-Based Attack on Sequential Logic Encryption Proceedings Article

In: 2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), IEEE, 2021.

Abstract | Links | BibTeX | Tags: Extract Design Secrets, IP Piracy, Overproduction, Reverse Engineering Attacks, Vulnerability Detection

Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup

Hands-on Learning of Hardware and Systems Security Journal Article

In: ASEE, vol. 9, no. 2, pp. 1-25, 2021.

Abstract | Links | BibTeX | Tags: Hardware Hacking Board

Yasaei, Rozhin; Yu, Shih-Yuan; Faruque, Mohammad Abdullah Al

GNN4TJ: Graph Neural Networks for Hardware Trojan Detection at Register Transfer Level Proceedings Article

In: 2021 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1504-1509, 2021, ISSN: 1558-1101.

Abstract | Links | BibTeX | Tags: Design For Trust

Reimann, Lennart M.; Hanel, Luca; Sisejkovic, Dominik; Merchant, Farhad; Leupers, Rainer

QFlow: Quantitative Information Flow for Security-Aware Hardware Design in Verilog Proceedings Article

In: IEEE International Conference on Computer Design, 2021.

Abstract | Links | BibTeX | Tags: Design For Trust

Yasaei, Rozhin; -, Shih; Naeini, Emad Kasaeyan; Faruque, Mohammad Abdullah Al

GNN4IP: Graph Neural Network for Hardware Intellectual Property Piracy Detection Journal Article

In: CoRR, vol. abs/2107.09130, 2021.

Abstract | Links | BibTeX | Tags: Design For Trust

Moghaddas, Yasamin; Nguyen, Tommy; Yu, Shih-Yuan; Yasaei, Rozhin; Faruque, Mohammad Abdullah Al

Technical Report for HW2VEC -- A Graph Learning Tool for Automating Hardware Security Miscellaneous

2021.

Abstract | BibTeX | Tags: Design For Trust

-, Shih; Yasaei, Rozhin; Zhou, Qingrong; Nguyen, Tommy; Faruque, Mohammad Abdullah Al

HW2VEC: A Graph Learning Tool for Automating Hardware Security Journal Article

In: CoRR, vol. abs/2107.12328, 2021.

Abstract | Links | BibTeX | Tags: Design For Trust

Faezi, Sina; Yasaei, Rozhin; Barua, Anomadarshi; Faruque, Mohammad Abdullah Al

Brain-Inspired Golden Chip Free Hardware Trojan Detection Journal Article

In: IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2697–2708, 2021.

Abstract | Links | BibTeX | Tags: Side Channel Analysis

Chakraborty, Prabuddha; Cruz, Jonathan; Alaql, Abdulrahman; Bhunia, Swarup

SAIL: Analyzing Structural Artifacts of Logic Locking using Machine Learning Journal Article

In: IEEE Transactions on Information Forensics and Security, pp. 1-1, 2021, ISSN: 1556-6021.

Abstract | Links | BibTeX | Tags:

Sengupta, Anirban; Rathor, Mahendra

Facial Biometric for Securing Hardware Accelerators Journal Article

In: IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 29, no. 1, pp. 112-123, 2021, ISSN: 1557-9999.

Abstract | Links | BibTeX | Tags: IP Protection

Sisejkovic, Dominik; Merchant, Farhad; Reimann, Lennart M; Srivastava, Harshit; Hallawa, Ahmed; Leupers, Rainer

Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach Journal Article

In: J. Emerg. Technol. Comput. Syst., vol. 17, no. 3, 2021, ISSN: 1550-4832.

Abstract | Links | BibTeX | Tags: Evaluation of Obfuscation

Sengupta, Anirban

Key-triggered Hash-chaining based Encoded Hardware Steganography for Securing DSP Hardware Accelerators Book Forthcoming

Forthcoming, ISBN: 978-1-83953-306-8.

BibTeX | Tags: IP Protection

Sengupta, Anirban

Cryptography driven IP steganography for DSP Hardware Accelerators Book Forthcoming

Forthcoming, ISBN: 978-1-83953-306-8.

BibTeX | Tags: IP Protection

Zhu, Huifeng; Guo, Xiaolong; Jin, Yier; Zhang, Xuan

PCBench: Benchmarking of Board-Level Hardware Attacks and Trojans Proceedings Article Forthcoming

In: IEEE/ACM Asia and South Pacific Design Automation Conference, Forthcoming.

Abstract | BibTeX | Tags: PCB Trust Verification

Zeng, Wei; Davoodi, Azadeh; Topaloglu, Rasit Onur

ObfusX: Routing Obfuscation with Explanatory Analysis of A Machine Learning Attack Proceedings Article

In: IEEE/ACM Asia and South Pacific Design Automation Conference, 2021.

Abstract | Links | BibTeX | Tags: Obfuscation

2020

F, Muhammad Arsath K; Ganesan, Vinod; Bodduna, Rahul; Rebeiro, Chester

PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance Journal Article

In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2020.

Links | BibTeX | Tags: SCA Attacks, Side Channel Analysis

F, Muhammad Arsath K; Ganesan, Vinod; Bodduna, Rahul; Rebeiro, Chester

PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance Proceedings Article

In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 23-34, 2020.

Abstract | Links | BibTeX | Tags: Side Channel Analysis

Yavuz, Tuba; Bai, Ken (Yihang)

Analyzing system software components using API model guided symbolic execution Journal Article

In: Automated Software Engineering, 2020, ISSN: 1573-7535.

Abstract | Links | BibTeX | Tags: Software Assurance

Albartus, Nils; Hoffmann, Max; Temme, Sebastian; Azriel, Leonid; Paar, Christof

DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering Journal Article

In: IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2020, no. 4, pp. 309-336, 2020.

Abstract | Links | BibTeX | Tags:

Rathor, Mahendra; Sengupta, Anirban

IP Core Steganography Using Switch Based Key-Driven Hash-Chaining and Encoding for Securing DSP Kernels Used in CE Systems Journal Article

In: IEEE Transactions on Consumer Electronics, vol. 66, no. 3, pp. 251-260, 2020, ISSN: 1558-4127.

Abstract | Links | BibTeX | Tags: IP Protection

Hoque, Tamzidul; Yang, Shuo; Bhattacharyay, Aritra; Cruz, Jonathan; Bhunia, Swarup

An Automated Framework for Board-level Trojan Benchmarking Miscellaneous

2020.

Abstract | Links | BibTeX | Tags: PCB Trust Verification

Srivastava, Milind; SLPSK, Patanjali; Roy, Indrani; Rebeiro, Chester; Hazra, Aritra; Bhunia, Swarup

SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware Proceedings Article

In: Design, Automation, and Test in Europe Conference Exhibition (DATE), pp. 310-313, DATE IEEE, 2020, ISBN: 978-3-9819263-4-7.

Abstract | Links | BibTeX | Tags: Fault Injection Attacks

K, Keerthi; Roy, Indrani; Rebeiro, Chester; Hazra, Aritra; Bhunia, Swarup

FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers Journal Article

In: IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2020, no. 2, pp. 272-299, 2020.

Abstract | Links | BibTeX | Tags: Fault Injection Attacks

Potluri, Seetal; Aysu, Aydin; Kumar, Akash

SeqL: Secure Scan-Locking for IP Protection Proceedings Article

In: 2020 21st International Symposium on Quality Electronic Design (ISQED), pp. 7-13, 2020, ISSN: 1948-3287.

Abstract | Links | BibTeX | Tags: IP Protection

Karfa, Chandan; Chouksey, Ramanuj; Pilato, Christian; Garg, Siddharth; Karri, Ramesh

Is Register Transfer Level Locking Secure? Proceedings Article

In: 2020 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 550-555, 2020, ISSN: 1558-1101.

Abstract | Links | BibTeX | Tags: Evaluation of Obfuscation

Lyu, Yangdi; Mishra, Prabhat

Automated Test Generation for Trojan Detection using Delay-based Side Channel Analysis Proceedings Article

In: 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1031–1036, IEEE 2020, ISSN: 1558-1101.

Abstract | Links | BibTeX | Tags: Side Channel

He, Jiaji; Ma, Haocheng; Guo, Xiaolong; Zhao, Yiqiang; Jin, Yier

Design for EM Side-Channel Security through Quantitative Assessment of RTL Implementations Proceedings Article

In: 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 62-67, IEEE, Beijing, China , 2020.

Abstract | Links | BibTeX | Tags: Side Channel

Xu, Nuo; Liu, Qi; Liu, Tao; Liu, Zihao; Guo, Xiaochen; Wen, Wujie

Stealing your data from compressed machine learning models Proceedings Article

In: 2020 57th ACM/IEEE Design Automation Conference (DAC), pp. 1–6, IEEE 2020.

Abstract | Links | BibTeX | Tags: Extract Design Secrets

Hoque, Tamzidul; Cruz, Jonathan; Chakraborty, Prabuddha; Bhunia, Swarup

TReC: Trojan-Resilient Computing in Untrusted Processors using Software Variants Conference

GOMACTech-2020 Conference, 2020.

BibTeX | Tags: Attack Resilience

Nair, Abhishek; SLPSK, Patanjali; Rebeiro, Chester; Bhunia, Swarup

SIGNED: A Challenge-Response Based Interrogation Scheme for Simultaneous Watermarking and Trojan Detection Miscellaneous

2020.

Links | BibTeX | Tags: IC Trust Verification

Santikellur, Pranesh; Chakraborty, Rajat Subhra

A Computationally Efficient Tensor Regression Network based Modeling Attack on XOR Arbiter PUF and its Variants Journal Article

In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp. 1-1, 2020, ISSN: 1937-4151.

Abstract | Links | BibTeX | Tags: Attack Resillience

Santikellur, Pranesh; Chakraborty, Rajat Subhra

A Computationally Efficient Tensor Regression Network based Modeling Attack on XOR Arbiter PUF and its Variants Journal Article

In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp. 1-1, 2020, ISSN: 1937-4151.

Abstract | Links | BibTeX | Tags: Attack Resilience

Alaql, Abdulrahman; Bhunia, Swarup

Scalable Attack-Resistant Obfuscation of Logic Circuits Miscellaneous

2020.

Links | BibTeX | Tags:

MIT-LL,

Common Evaluation Platform (CEP) Miscellaneous

2020.

Abstract | Links | BibTeX | Tags:

Rathor, Mahendra; Sengupta, Anirban

Design Flow of Secured N-Point DFT Application Specific Processor Using Obfuscation and Steganography Journal Article

In: IEEE Letters of the Computer Society, vol. 3, no. 1, pp. 13-16, 2020, ISSN: 2573-9689.

Abstract | Links | BibTeX | Tags: IP Protection

Sengupta, Anirban; Rathor, Mahendra

Structural Obfuscation and Crypto-Steganography-Based Secured JPEG Compression Hardware for Medical Imaging Systems Journal Article

In: IEEE Access, vol. 8, pp. 6543-6565, 2020, ISSN: 2169-3536.

Abstract | Links | BibTeX | Tags: IP Protection

Nahiyan, Adib; Park, Jungmin; He, Miao; Iskander, Yousef; Farahmandi, Farimah; Forte, Domenic; Tehranipoor, Mark

SCRIPT: A CAD Framework for Power Side-channel Vulnerability Assessment Using Information Flow Tracking and Pattern Generation Journal Article

In: ACM Trans. Des. Autom. Electron. Syst., vol. 25, no. 3, pp. 1–27, 2020, ISSN: 1084-4309.

Abstract | Links | BibTeX | Tags: Side Channel

Surabhi, Virinchi Roy; Krishnamurthy, Prashanth; Amrouch, Hussam; Basu, Kanad; Henkel, Jörg; Karri, Ramesh; Khorrami, Farshad

Hardware Trojan Detection Using Controlled Circuit Aging Journal Article

In: IEEE Access, vol. 8, pp. 77415–77434, 2020, ISSN: 2169-3536.

Abstract | Links | BibTeX | Tags: Hardware Trojans

Lyu, Yangdi; Mishra, Prabhat

Automated Trigger Activation by Repeated Maximal Clique Sampling Proceedings Article

In: 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 482–487, IEEE 2020, ISSN: 2153-697X.

Abstract | Links | BibTeX | Tags: Hardware Trojans

Lyu, Yangdi; Mishra, Prabhat

Scalable Activation of Rare Triggers in Hardware Trojans by Repeated Maximal Clique Sampling Journal Article

In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp. 1-1, 2020, ISSN: 1937-4151.

Abstract | Links | BibTeX | Tags: Hardware Trojans

Kuruvila, Abraham Peedikayil; Kundu, Shamik; Basu, Kanad

Defending Hardware-based Malware Detectors against Adversarial Attacks Journal Article

In: arXiv preprint arXiv:2005.03644, 2020.

Abstract | Links | BibTeX | Tags: Attack Resillience

Zuzak, Michael; Srivastava, Ankur

ObfusGEM: Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design Proceedings Article

In: International Symposium on Memory Systems (MEMSYS), 2020.

BibTeX | Tags: Evaluation of Obfuscation

Rajarathnam, Rachel Selina; Lin, Yibo; Jin, Yier; Pan, David Z.

ReGDS: A Reverse Engineering Framework from GDSII to Gate-level Netlist Journal Article

In: Hardware-Oriented Security and Trust (HOST), 2020.

Abstract | Links | BibTeX | Tags: IP Protection

Hoque, Tamzidul; Chakraborty, Rajat Subhra; Bhunia, Swarup

Hardware Obfuscation and Logic Locking: A Tutorial Introduction Journal Article

In: IEEE Design Test, pp. 1-1, 2020, ISSN: 2168-2364.

Abstract | Links | BibTeX | Tags: Evaluation of Obfuscation

Hoque, Tamzidul; SLPSK, Patanjali; Bhunia, Swarup

Trust Issues in Microelectronics: The Concerns and the Countermeasures Journal Article

In: IEEE Consumer Electronics Magazine, pp. 1-1, 2020, ISSN: 2162-2256.

Abstract | Links | BibTeX | Tags: Trust Issues

2019

Portillo, Jason; Meade, Travis; Hacker, John; Zhang, Shaojie; Jin, Yier

RERTL: Finite State Transducer Logic Recovery at Register Transfer Level Proceedings Article

In: 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 1-6, ASIAN-HOST IEEE, Xi'an, P.R. China, 2019.

Abstract | Links | BibTeX | Tags: Reverse Engineering

Ma, Haocheng; He, Jiaji; Liu, Yanjiang; Zhao, Yiqiang; Jin, Yier

CAD4EM-P: Security-Driven Placement Tools for Electromagnetic Side Channel Protection Proceedings Article

In: 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 1-6, IEEE, Xi'an, P.R. China, 2019.

Abstract | Links | BibTeX | Tags: Side Channel

127 entries « 1 of 3 »