no code implementations • 19 Apr 2022 • David Selasi Koblah, Rabin Yu Acharya, Daniel Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly used in several fields to improve performance and the level of automation.
no code implementations • 28 Apr 2020 • Ronald Wilson, Navid Asadizanjani, Domenic Forte, Damon L. Woodard
In this paper, we introduce an algorithm to segment out Integrated Circuit (IC) structures from the SEM image.
no code implementations • 31 Mar 2020 • Rabin Yu Acharya, Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte
We also discuss how the GA attack can generalize to other recent analog locking techniques not tested in the paper
no code implementations • 11 Feb 2020 • Ulbert J. Botero, Ronald Wilson, Hangwei Lu, Mir Tanjidur Rahman, Mukhil A. Mallaiyan, Fatemeh Ganji, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard, Domenic Forte
In the context of hardware trust and assurance, reverse engineering has been often considered as an illegal action.
no code implementations • 20 Apr 2019 • Zimu Guo, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte
These modules guarantee the stream cipher is correctly synchronized and free from tampering.
Cryptography and Security