no code implementations • 21 Feb 2024 • Vasudev Gohil, Satwik Patnaik, Dileep Kalathil, Jeyavijayan Rajendran
We target five GNN-based techniques for four crucial classes of problems in hardware security: IP piracy, detecting/localizing HTs, reverse engineering, and hardware obfuscation.
no code implementations • 29 Aug 2022 • Satwik Patnaik, Vasudev Gohil, Hao Guo, Jeyavijayan, Rajendran
In this brief, we outline the development of RL agents in detecting hardware Trojans, one of the most challenging hardware security problems.
no code implementations • 26 Aug 2022 • Vasudev Gohil, Hao Guo, Satwik Patnaik, Jeyavijayan, Rajendran
Stealthy hardware Trojans (HTs) inserted during the fabrication of integrated circuits can bypass the security of critical infrastructures.
no code implementations • 26 Aug 2022 • Vasudev Gohil, Satwik Patnaik, Hao Guo, Dileep Kalathil, Jeyavijayan, Rajendran
Insertion of hardware Trojans (HTs) in integrated circuits is a pernicious threat.
no code implementations • 8 Jul 2020 • Haocheng Li, Satwik Patnaik, Abhrajit Sengupta, Hao-Yu Yang, Johann Knechtel, Bei Yu, Evangeline F. Y. Young, Ozgur Sinanoglu
The notion of integrated circuit split manufacturing which delegates the front-end-of-line (FEOL) and back-end-of-line (BEOL) parts to different foundries, is to prevent overproduction, piracy of the intellectual property (IP), or targeted insertion of hardware Trojans by adversaries in the FEOL facility.
no code implementations • 14 Nov 2017 • Satwik Patnaik, Mohammed Ashraf, Johann Knechtel, Ozgur Sinanoglu
Our scheme is based on obfuscating the interconnects (BEOL); it can be readily applied to any design without modifications in the device layer (FEOL).
Cryptography and Security