Skip to main content

Showing 1–3 of 3 results for author: Forte, D

Searching in archive eess. Search in all archives.
.
  1. arXiv:2401.12193  [pdf, other

    cs.CR eess.SP

    Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization

    Authors: Hanqiu Wang, Max Panoff, Zihao Zhan, Shuo Wang, Christophe Bobda, Domenic Forte

    Abstract: Side-channel analysis has been proven effective at detecting hardware Trojans in integrated circuits (ICs). However, most detection techniques rely on large external probes and antennas for data collection and require a long measurement time to detect Trojans. Such limitations make these techniques impractical for run-time deployment and ineffective in detecting small Trojans with subtle side-chan… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    Comments: 6 pages, 5 figures, Accepted at DATE2024

  2. arXiv:2004.13874  [pdf, other

    eess.IV cs.CR cs.CV

    Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images

    Authors: Ronald Wilson, Navid Asadizanjani, Domenic Forte, Damon L. Woodard

    Abstract: In the Reverse Engineering and Hardware Assurance domain, a majority of the data acquisition is done through electron microscopy techniques such as Scanning Electron Microscopy (SEM). However, unlike its counterparts in optical imaging, only a limited number of techniques are available to enhance and extract information from the raw SEM images. In this paper, we introduce an algorithm to segment o… ▽ More

    Submitted 28 April, 2020; originally announced April 2020.

  3. arXiv:2002.04210  [pdf, other

    eess.IV cs.CR

    Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives

    Authors: Ulbert J. Botero, Ronald Wilson, Hangwei Lu, Mir Tanjidur Rahman, Mukhil A. Mallaiyan, Fatemeh Ganji, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard, Domenic Forte

    Abstract: In the context of hardware trust and assurance, reverse engineering has been often considered as an illegal action. Generally speaking, reverse engineering aims to retrieve information from a product, i.e., integrated circuits (ICs) and printed circuit boards (PCBs) in hardware security-related scenarios, in the hope of understanding the functionality of the device and determining its constituent… ▽ More

    Submitted 7 April, 2021; v1 submitted 11 February, 2020; originally announced February 2020.

    Comments: It is essential not to reduce the size of the figures as high quality ones are required to discuss the image processing algorithms and methods