no code implementations • 6 Mar 2023 • Animesh Basak Chowdhury, Lilas Alrahis, Luca Collini, Johann Knechtel, Ramesh Karri, Siddharth Garg, Ozgur Sinanoglu, Benjamin Tan
Oracle-less machine learning (ML) attacks have broken various logic locking schemes.
1 code implementation • 29 Nov 2022 • Lilas Alrahis, Johann Knechtel, Ozgur Sinanoglu
Graph neural networks (GNNs) have pushed the state-of-the-art (SOTA) for performance in learning and predicting on large-scale data present in social networks, biology, etc.
no code implementations • 15 Nov 2022 • Fangzhou Wang, Qijing Wang, Bangqi Fu, Shui Jiang, Xiaopeng Zhang, Lilas Alrahis, Ozgur Sinanoglu, Johann Knechtel, Tsung-Yi Ho, Evangeline F. Y. Young
In this work, we proactively and systematically harden the physical layouts of ICs against post-design insertion of Trojans.
1 code implementation • 4 Aug 2022 • Lilas Alrahis, Johann Knechtel, Florian Klemme, Hussam Amrouch, Ozgur Sinanoglu
Without a precise understanding of the impact of variations on the delay of circuit paths, guardbands, which keep timing violations at bay, cannot be correctly estimated.
no code implementations • 8 Jul 2020 • Haocheng Li, Satwik Patnaik, Abhrajit Sengupta, Hao-Yu Yang, Johann Knechtel, Bei Yu, Evangeline F. Y. Young, Ozgur Sinanoglu
The notion of integrated circuit split manufacturing which delegates the front-end-of-line (FEOL) and back-end-of-line (BEOL) parts to different foundries, is to prevent overproduction, piracy of the intellectual property (IP), or targeted insertion of hardware Trojans by adversaries in the FEOL facility.
no code implementations • 14 Nov 2017 • Satwik Patnaik, Mohammed Ashraf, Johann Knechtel, Ozgur Sinanoglu
Our scheme is based on obfuscating the interconnects (BEOL); it can be readily applied to any design without modifications in the device layer (FEOL).
Cryptography and Security