Securing 3rd-Party HDL IP: a Feasibility Study Using Evolutionary Methods
- 31 March 2022
- journal article
- research article
- Published by Springer Science and Business Media LLC in Journal of Hardware and Systems Security
- Vol. 6 (1-2), 17-31
- https://doi.org/10.1007/s41635-022-00125-9
Abstract
No abstract availableKeywords
Funding Information
- Air Force Research Laboratory (FA8650-18-C-1191 P00005)
This publication has 24 references indexed in Scilit:
- Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean SatisfiabilityPublished by Springer Science and Business Media LLC ,2015
- Hardware trojan attacks in FPGA devicesPublished by Association for Computing Machinery (ACM) ,2014
- On design vulnerability analysis and trust benchmarks developmentPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Spontaneous evolution of modularity and network motifsProceedings of the National Academy of Sciences of the United States of America, 2005
- Automated hardware design using genetic programming, VHDL, and FPGAsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- HereBoy: a fast evolutionary algorithmPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On Evolvable HardwareStudies in Fuzziness and Soft Computing, 2002
- A genetic algorithm framework for test generationIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 1997
- On the editing distance between unordered labeled treesInformation Processing Letters, 1992
- Simple Fast Algorithms for the Editing Distance between Trees and Related ProblemsSIAM Journal on Computing, 1989