Skip to main content

Showing 1–6 of 6 results for author: Yasaei, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.08614  [pdf

    cs.IR cs.HC

    H2-Golden-Retriever: Methodology and Tool for an Evidence-Based Hydrogen Research Grantsmanship

    Authors: Paul Seurin, Olusola Olabanjo, Joseph Wiggins, Lorien Pratt, Loveneesh Rana, Rozhin Yasaei, Gregory Renard

    Abstract: Hydrogen is poised to play a major role in decarbonizing the economy. The need to discover, develop, and understand low-cost, high-performance, durable materials that can help maximize the cost of electrolysis as well as the need for an intelligent tool to make evidence-based Hydrogen research funding decisions relatively easier warranted this study.In this work, we developed H2 Golden Retriever (… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

    Comments: 25 pages

  2. arXiv:2207.06664  [pdf, other

    cs.CY cs.AI

    Golden Reference-Free Hardware Trojan Localization using Graph Convolutional Network

    Authors: Rozhin Yasaei, Sina Faezi, Mohammad Abdullah Al Faruque

    Abstract: The globalization of the Integrated Circuit (IC) supply chain has moved most of the design, fabrication, and testing process from a single trusted entity to various untrusted third-party entities worldwide. The risk of using untrusted third-Party Intellectual Property (3PIP) is the possibility for adversaries to insert malicious modifications known as Hardware Trojans (HTs). These HTs can compromi… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

    Comments: IEEE Transactions on Very Large Scale Integration Systems (TVLSI), 2022

  3. arXiv:2204.11431  [pdf, other

    cs.CR cs.AR

    Hardware Trojan Detection using Graph Neural Networks

    Authors: Rozhin Yasaei, Luke Chen, Shih-Yuan Yu, Mohammad Abdullah Al Faruque

    Abstract: The globalization of the Integrated Circuit (IC) supply chain has moved most of the design, fabrication, and testing process from a single trusted entity to various untrusted third-party entities around the world. The risk of using untrusted third-Party Intellectual Property (3PIP) is the possibility for adversaries to insert malicious modifications known as Hardware Trojans (HTs). These HTs can c… ▽ More

    Submitted 25 April, 2022; originally announced April 2022.

  4. arXiv:2108.00078  [pdf

    cs.CR

    Technical Report for HW2VEC -- A Graph Learning Tool for Automating Hardware Security

    Authors: Yasamin Moghaddas, Tommy Nguyen, Shih-Yuan Yu, Rozhin Yasaei, Mohammad Abdullah Al Faruque

    Abstract: In this technical report, we present HW2VEC [11], an open-source graph learning tool for hardware security, and its implementation details (Figure 1). HW2VEC provides toolboxes for graph representation extraction in the form of Data Flow Graphs (DFGs) or Abstract Syntax Trees (ASTs) from hardware designs at RTL and GLN levels. Besides, HW2VEC also offers graph learning tools for representing hardw… ▽ More

    Submitted 27 July, 2021; originally announced August 2021.

    Comments: arXiv admin note: text overlap with arXiv:2107.12328

  5. arXiv:2107.12328  [pdf, other

    cs.CR cs.LG

    HW2VEC: A Graph Learning Tool for Automating Hardware Security

    Authors: Shih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, Mohammad Abdullah Al Faruque

    Abstract: The time-to-market pressure and continuous growing complexity of hardware designs have promoted the globalization of the Integrated Circuit (IC) supply chain. However, such globalization also poses various security threats in each phase of the IC supply chain. Although the advancements of Machine Learning (ML) have pushed the frontier of hardware security, most conventional ML-based methods can on… ▽ More

    Submitted 26 July, 2021; originally announced July 2021.

  6. arXiv:2107.09130  [pdf, other

    cs.CR cs.LG

    GNN4IP: Graph Neural Network for Hardware Intellectual Property Piracy Detection

    Authors: Rozhin Yasaei, Shih-Yuan Yu, Emad Kasaeyan Naeini, Mohammad Abdullah Al Faruque

    Abstract: Aggressive time-to-market constraints and enormous hardware design and fabrication costs have pushed the semiconductor industry toward hardware Intellectual Properties (IP) core design. However, the globalization of the integrated circuits (IC) supply chain exposes IP providers to theft and illegal redistribution of IPs. Watermarking and fingerprinting are proposed to detect IP piracy. Nevertheles… ▽ More

    Submitted 19 July, 2021; originally announced July 2021.