Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs
Field-programmable gate arrays (FPGAs) offer the inherent ability to reconfigure at runtime, making them ideal for applications such as data centers, cloud computing, and edge computing. This reconfiguration, often achieved through remote access, enables
Jaya Dofe +3 more
doaj +1 more source
87th Annual Meeting of the Meteoritical Society 2025: Abstracts
Meteoritics &Planetary Science, Volume 60, Issue S1, Page 30-350, August 2025.
wiley +1 more source
A cycle-level recovery method for embedded processor against HT tamper. [PDF]
Zhou W, Ye KH, Yuan S, Li L.
europepmc +1 more source
GNN-MFF: A Multi-View Graph-Based Model for RTL Hardware Trojan Detection
The globalization of hardware design flows has increased the risk of Hardware Trojan (HT) insertion during the design phase. Graph-based learning methods have shown promise for HT detection at the Register Transfer Level (RTL).
Senjie Zhang +4 more
doaj +1 more source
Hardware Trojan Mitigation Technique in Network-on-Chip (NoC). [PDF]
Hussain M +6 more
europepmc +1 more source
A Circuit-Level Solution for Secure Temperature Sensor. [PDF]
Kajol MA, Monjur MMR, Yu Q.
europepmc +1 more source
A Review: The Beauty of Serendipity Between Integrated Circuit Security and Artificial Intelligence. [PDF]
Dong C +7 more
europepmc +1 more source
Near-Field Microwave Sensing for Chip-Level Tamper Detection. [PDF]
Saadat Safa M, Tajik S.
europepmc +1 more source
Systematic Evaluation of Machine Learning and Deep Learning Models for IoT Malware Detection Across Ransomware, Rootkit, Spyware, Trojan, Botnet, Worm, Virus, and Keylogger. [PDF]
Maghanaki M +3 more
europepmc +1 more source

