Reverse Engineering

CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering

Authors: Amir Hosein Afandizadeh Zargari, Marzieh AshrafiAmiri, Minjun Seo, Sai Manoj Pudukotai Dinakarrao, Mohammed E. Fouda, Fadi Kurdahi | Published: 2021-10-21
Reverse Engineering
Adversarial Training
Machine Learning Method

Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling

Authors: Md Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh | Published: 2021-03-11
Model Performance Evaluation
Reverse Engineering
Adversarial attack