ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Frontiers of Quality Electronic Design (QED): AI, IoT and Hardware Security

دانلود کتاب مرزهای طراحی الکترونیکی با کیفیت (QED): هوش مصنوعی، اینترنت اشیا و امنیت سخت افزار

Frontiers of Quality Electronic Design (QED): AI, IoT and Hardware Security

مشخصات کتاب

Frontiers of Quality Electronic Design (QED): AI, IoT and Hardware Security

ویرایش:  
نویسندگان:   
سری:  
ISBN (شابک) : 3031163435, 9783031163432 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 689
[690] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 24 Mb 

قیمت کتاب (تومان) : 33,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 3


در صورت تبدیل فایل کتاب Frontiers of Quality Electronic Design (QED): AI, IoT and Hardware Security به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مرزهای طراحی الکترونیکی با کیفیت (QED): هوش مصنوعی، اینترنت اشیا و امنیت سخت افزار نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مرزهای طراحی الکترونیکی با کیفیت (QED): هوش مصنوعی، اینترنت اشیا و امنیت سخت افزار



منظر طراحی الکترونیکی با کیفیت (QED) منطقه وسیعی را در بر می گیرد که در آن قلمروهای بسیاری از رشته ها و فناوری های شرکت کننده با هم همپوشانی دارند. این کتاب آخرین روندها را در چندین موضوع کلیدی مرتبط با طراحی الکترونیکی با کیفیت، با تاکید بر امنیت سخت افزار، امنیت سایبری، یادگیری ماشین و کاربرد هوش مصنوعی (AI) بررسی می کند. این کتاب شامل موضوعاتی در حافظه های غیر فرار (NVM)، اینترنت اشیا (IoT)، FPGA و شبکه های عصبی است.


توضیحاتی درمورد کتاب به خارجی

Quality Electronic Design (QED)’s landscape spans a vast region where territories of many participating disciplines and technologies overlap.  This book explores the latest trends in several key topics related to quality electronic design, with emphasis on Hardware Security, Cybersecurity, Machine Learning, and application of Artificial Intelligence (AI). The book includes topics in nonvolatile memories (NVM), Internet of Things (IoT), FPGA, and Neural Networks. 



فهرست مطالب

Preface
Acknowledgements
Contents
About the Authors
NAND Flash Memory Devices Security Enhancement Based on Physical Unclonable Functions
	1 Multimode Physical Unclonable Function as an Entropy Source for Generating True Random Bits
		1.1 Introduction
		1.2 General Description of a Circuit
		1.3 Operation of the Entropy Source
			1.3.1 Initial Memory
			1.3.2 Ring Oscillator
			1.3.3 Metastability
			1.3.4 Latch
		1.4 Experimental Results
			1.4.1 Initial Memory
			1.4.2 Ring Oscillator
			1.4.3 Metastability
			1.4.4 Latch
		1.5 Conclusion
	2 Raw Read-Based Physical Unclonable Function for TLC NAND Flash
		2.1 Introduction
		2.2 Control of the Entropy Source
			2.2.1 Enrollment
			2.2.2 Generation
		2.3 Experimental Results
			2.3.1 Enrollment
			2.3.2 Generation
		2.4 Conclusion
	3 Flash Memory Device Identification Based on Physical Unclonable Functions
		3.1 Introduction
		3.2 ID Generation Algorithm
		3.3 Example of ID Generation
		3.4 Experimental Results
			3.4.1 Reliability
			3.4.2 Uniqueness
		3.5 Conclusion
	4 Design of Data Scrambler with Enhanced Physical Security
		4.1 Introduction
		4.2 Proposed Scrambler Circuit Operation
		4.3 Experimental Results
			4.3.1 Option 1
			4.3.2 Option 2
		4.4 Conclusion
	5 Physical Unclonable Function-Based Error Detection Algorithm for Data Integrity
		5.1 Introduction
		5.2 Proposed Data Path Design
		5.3 Example of Usage in Mobile NAND Flash Devices
		5.4 Conclusion
	6 Conclusion
	Appendix
	References
ReRAM-Based Neuromorphic Computing
	1 Introduction
	2 The Memristor
	3 ReRAM: Implementation of the Memristor
	4 Comparison of ReRAMs with Other Memory Technologies
	5 Use of ReRAMs as Synapses
	6 Use of ReRAMs as Neurons
	7 ReRAMs in Neuromorphic Computing
	8 ReRAM Crossbars
	9 ReRAM-Based Spiking Neural Network
	10 Spike Time-Dependent Plasticity
	11 STDP Functionality in ReRAMs
	12 ReRAM-Based SNN Architectures
	13 Other ReRAM-Based Neural Networks
	14 Conclusion
	References
Flash: A ``Forgotten'' Technology in VLSI Design
	1 Chapter Summary
	2 Technology Overview
		2.1 Flash Transistors
		2.2 Pseudo-Flash Transistor
	3 ASIC Replacement
		3.1 Digital Circuit Design Using Flash Transistors
			3.1.1 Flash-Based Digital Circuit Implementation
			3.1.2 Flash-Based Implementation Results
			3.1.3 Tuning Delay, Power, and Energy
			3.1.4 Flash-Based Design Conversion
			3.1.5 Performance of Our Conversion Flow
			3.1.6 Conclusion
		3.2 Perceptron Hardware: Flash Threshold Logic Cells
			3.2.1 Flash Threshold Logic (FTL) Cell Architecture
			3.2.2 Related Work
			3.2.3 Experimental Results
			3.2.4 Summary
		3.3 Input and Output Hybridization for Enhanced Security in ASIC Circuits
			3.3.1 Security and Hybridization
			3.3.2 Previous Work
			3.3.3 SAT-Based Threshold Function Identification and Weight Generation
			3.3.4 Results
		3.4 Benefits of Flash-Based ASIC Design
	4 Neural Network Accelerators
		4.1 A Configurable BNN ASIC Using a Network of Programmable Threshold Logic Standard Cells
			4.1.1 Binary Neural Network Using Binary Neurons
			4.1.2 Hardware Architecture of TULIP-PE
			4.1.3 Addition and Accumulation Operation
			4.1.4 Comparison, Batch Normalization, Max Pooling, and RELU Operation
			4.1.5 Top-Level View of the Architecture
			4.1.6 Experimental Results
			4.1.7 Conclusion
		4.2 A Flash-Based Current-Mode IC to Realize Quantized Neural Networks
			4.2.1 Fully Connected (FC) Node Design
			4.2.2 Convolution (CONV) Node Design
			4.2.3 MAXPOOL
			4.2.4 Batch Normalization
			4.2.5 Dataflow Architecture
			4.2.6 Experiment and Results
			4.2.7 Conclusion
	5 CIDAN: Computing in DRAM with Artificial Neurons
		5.1 Introduction
		5.2 Threshold Logic Processing Element (TLPE)
		5.3 Top-Level Architecture of CIDAN
		5.4 System-Level Integration and the Controller Design
		5.5 Experimental Results
		5.6 Conclusion
	6 Flash Devices in Analog Circuits
		6.1 Flash-Based Digital to Analog Conversion
			6.1.1 Design
			6.1.2 Features
			6.1.3 Performance Metrics
			6.1.4 Summary
		6.2 Pseudo-Flash-Based Digital Low-Dropout Regulator
			6.2.1 Proposed Pseudo-Flash-Based Digital LDO
			6.2.2 Coarse-Fine Controller
			6.2.3 Simulation Results
		6.3 Summary
	7 Conclusions and Future Outlook
	References
Nonvolatile Memory Technologies: Characteristics, Deployment, and Research Challenges
	1 Introduction
	2 Characteristics of NVM Devices
		2.1 Flash Storage Devices
		2.2 Phase Change Memory (PCM)
		2.3 Resistive Random Access Memory (ReRAM/RRAM)
		2.4 Ferro-Electric Random Access Memory (FeRAM)
		2.5 Carbon Nanotube Random Access Memory (NRAM)
		2.6 Spin-Transfer Torque RAM (STT-RAM)
	3 Deployment of Nonvolatile Memories in Computing System
		3.1 Deploying NVM Devices as Processor Cache
		3.2 Integrating NVM as Main Memory
			3.2.1 Replacing Conventional Memory Devices with NVM
			3.2.2 Integrating NVM and DRAM as Hybrid Memories
		3.3 Deploying NVM as Storage
	4 Challenges in Adopting NVM Devices at Different Levels of Memory
		4.1 Design Issues in Utilizing NVM as Cache
			4.1.1 Management of Hybrid Caches
			4.1.2 Challenges in Adopting Hybrid Caches
		4.2 Challenges in Adapting NVM as a Candidate for Hybrid Memories
		4.3 Challenges in Adopting NVM as Storage Media
			4.3.1 Changes to the Operating System
			4.3.2 Modifications in the File System
	5 Current Research Challenges
		5.1 Lifetime Improvement
			5.1.1 Wear-Leveling Techniques
			5.1.2 Write Reduction Techniques
			5.1.3 Error Correction
		5.2 Multilevel Cell
			5.2.1 Multilevel Cell Property in PCM
			5.2.2 Multilevel Cell Property in ReRAM
			5.2.3 Multilevel Cell Property of STT-RAM
			5.2.4 Multilevel Cell of FeRAM
		5.3 Accelerators
		5.4 Security
	6 Application of NVM Devices in IoT and AI
	7 Simulators
	8 Conclusions and Future Scope
	References
Data Analytics and Machine Learning for Coverage Closure
	1 Introduction
	2 Descriptive Coverage Analysis
		2.1 Coverage Views
			2.1.1 Selections
			2.1.2 Projections
			2.1.3 Groupings
		2.2 Hole Analysis: Automatic Descriptive Coverage Analysis
			2.2.1 Algorithm for Projected Holes
			2.2.2 Algorithm for Aggregated Holes
		2.3 Machine Learning-Based Discovery of Coverage Model Structure
			2.3.1 Clustering Events into Cross-Products
			2.3.2 Improving the Cross-Product Quality
			2.3.3 Usage Results
	3 Template Aware Coverage
		3.1 TAC Use-Cases and Queries
			3.1.1 Best Test-Templates to Hit an Event
			3.1.2 Best Test-Templates to Hit a Coverage Model
			3.1.3 Coverage of a Test-Template
			3.1.4 Uniquely Hit Events
			3.1.5 Aged-Out Events
		3.2 Implementation
			3.2.1 Data Structures
			3.2.2 Sparse Matrix Operations
			3.2.3 Performance
	4 Automatic Coverage Closure
		4.1 Coverage-Based Regression
			4.1.1 Finding an Optimized Test Policy
			4.1.2 Mapping Verification Goals to TAC-Optimized Test Policies
		4.2 Coverage-Directed Generation
			4.2.1 Problem Definition
			4.2.2 Approximated Target Function
			4.2.3 Random Sample
			4.2.4 Optimization
			4.2.5 Combining Random Sampling and Optimization
		4.3 CDG for Large Sets of Events
			4.3.1 Event After Event Implicit Filtering for Multiple Targets
			4.3.2 Machine Learning Accelerated Implicit Filtering
			4.3.3 Experimental Results
	5 Conclusions
	References
Cell-Aware Model Generation Using Machine Learning
	1 Introduction
	2 Background on Standard Cell Characterization
		2.1 Standard Cell Characterization for Design Purpose
		2.2 Cell Internal Defect Universe
		2.3 Standard Cell Characterization for Test and Diagnosis Purpose
		2.4 Cell-Aware Model Generation: A Machine-Learning Friendly Process
	3 Learning-Based Cell-Aware Model Generation Flow
		3.1 Generation of Training Data
		3.2 Generation of New Data
	4 Cell and Defect Representation in the Cell-Aware Matrix
		4.1 Identification of Active, Passive, and Pulsing Transistors
		4.2 Renaming of Transistors
			4.2.1 Determination of Branch Equations
			4.2.2 Sorting of Branch Equations
		4.3 Identification of Parallel Transistors
		4.4 Defect Representation in the Cell-Aware Matrix
	5 Validation on Industrial Cell Libraries
		5.1 Predicting Defect Behavior on the Same Technology
			5.1.1 Combinational Standard Cells
			5.1.2 Sequential Standard Cells
		5.2 Predicting Defect Behavior on Another Technology
			5.2.1 Combinational Standard Cells
			5.2.2 Analysis and Discussion
			5.2.3 Sequential Standard Cells
			5.2.4 Controlled Experiments
	6 Hybrid Flow for CA Model Generation
		6.1 Runtime Saving for Combinational Cells
		6.2 Runtime Saving for Sequential Cells
	7 Discussion and Conclusion
	References
Neuromorphic Computing: A Path to Artificial Intelligence Through Emulating Human Brains
	1 Introduction
	2 Biological Neural System
		2.1 Neurons and Synapses
		2.2 Associative Memory Learning
	3 Modeling Neural System
		3.1 Leaky Integrate and Fire Neuron Model
		3.2 Hodgkin-Huxley Neuron Model
		3.3 Izhikevich Neuron Model
		3.4 McCulloch-Pitts Neuron Model
		3.5 Neural Coding
	4 Silicon Brain
		4.1 Electronic Neurons
		4.2 Memristive Synapses
	5 Neuromorphic Chips
		5.1 Loihi Chips
		5.2 Dynamic Neuromorphic Asynchronous Processors
		5.3 TrueNorth Chips
		5.4 Neurogrid Chips
		5.5 BrainScaleS Project
		5.6 Human Brain Project
	6 Challenges and Opportunities
	References
AI for Cybersecurity in Distributed Automotive IoT Systems
	1 Introduction
	2 Related Work
	3 Background on Sequence Learning
		3.1 Sequence Models
			3.1.1 Recurrent Neural Network (RNN)
			3.1.2 Long Short-Term Memory (LSTM) Networks
			3.1.3 Gated Recurrent Unit (GRU)
		3.2 Autoencoders
	4 Definitions and Problem Formulation
		4.1 System Model
		4.2 Communication Model
		4.3 Attack Model
	5 INDRA Framework Overview
		5.1 Recurrent Autoencoder
			5.1.1 Model Architecture
			5.1.2 Training Procedure
		5.2 Inference and Detection
	6 Experiments
		6.1 Experimental Setup
		6.2 Intrusion Threshold Selection
		6.3 Comparison of INDRA Variants
		6.4 Comparison with Prior Works
		6.5 IDS Overhead Analysis
		6.6 Scalability Results
	7 Conclusion
	References
Ultralow-Power Implementation of Neural Networks Using Inverter-Based Memristive Crossbars
	1 Introduction
	2 Literature Review
		2.1 Memristor
		2.2 Memristive Neuron Circuit
		2.3 Memristor Non-idealities
	3 Mathematical Analysis
		3.1 Circuit Model of an IM Neuron
		3.2 Effects of Non-idealities on the Outputs of IM Neurons
			3.2.1 Variations of the Activation Functions Coefficients
			3.2.2 IM Neuron Output Sensitivity to the Conductance Variation of Memristors
			3.2.3 IM-NN Primary Output Sensitivity to Characteristic Variations of Circuit Elements
		3.3 Inductions Drawn from the Above Analysis
	4 Input/Output Interfaces
		4.1 Memristive DAC
		4.2 Memristive ADC
	5 Training of IM-NNs
		5.1 PHAX
		5.2 RIM
		5.3 LATIM
		5.4 ERIM
			5.4.1 Implementation of Adjustable-Size Inverters
		5.5 OCTAN
	6 Variation Mitigation Methods
		6.1 Variation-Aware Training (VAT)
		6.2 INTERSTICE
	7 Comparison of Different Training Methods
		7.1 Training Methods
		7.2 IM-NN Accuracy in the Presence of Variations
		7.3 Comparing Different Training Methods
		7.4 Opportunities for Future Research
	References
AI-Based Hardware Security Methods for Internet-of-Things Applications
	1 Introduction
	2 Hardware Attacks
		2.1 IP Piracy
		2.2 Reverse Engineering
		2.3 Counterfeiting
		2.4 Hardware Trojans
		2.5 Side-Channel Attacks
	3 Countermeasures Against Side-Channel Attacks and Hardware Trojans Insertion
		3.1 Generic Countermeasures for SCA
		3.2 Generic Countermeasures Against Hardware Trojan Insertions
		3.3 Countermeasures Against Physical Attacks in IoT
		3.4 Countermeasures Against Hardware Trojans in IoT
	4 Unified Countermeasures for IoT
	5 3D ICs and Machine Learning
	6 Securing IoT Infrastructure Using Artificial Intelligence (AI) and Machine Learning (ML)
		6.1 Hardware Trojan Detection Using AI and ML
		6.2 Hardware Trojan Detection in IoT Systems Using AI and ML
	7 Leveraging 3D Integration for Hardware Security in IoT Devices
	8 Discussion
	References
Enabling Edge Computing Using Emerging Memory Technologies: From Device to Architecture
	1 Introduction and Motivations
		1.1 Von-Neumann vs. Non-Von-Neumann Architectures
		1.2 Normally Off Computing Systems
	2 Emerging Magnetic RAM (MRAM) Technology
		2.1 STT-MRAM
		2.2 SOT-MRAM
	3 Enabling Data-Intensive Computing Paradigm
		3.1 General Processing-in-Memory Structure
		3.2 Circuit-Level Exploration: Evolution of the MRAM-Based PIM Platforms
			3.2.1 Basic PIM Supporting (N)AND, (N)OR
			3.2.2 Reconfigurable Complete PIM Supporting X(N)OR
			3.2.3 Reconfigurable PIM Supporting Two-Cycle In-Memory Addition
			3.2.4 Reconfigurable PIM Supporting One-Cycle In-Memory Addition
		3.3 Convolutional Neural Networks (CNN) Acceleration: Analog or Digital PIM Approach?
			3.3.1 CNN Terminology
			3.3.2 Evaluation Framework
			3.3.3 Performance Analysis
	4 Enabling Reliable and Resilient Computing Paradigm
		4.1 MG-Based Synthesis and Optimization Research Tool
			4.1.1 Technology-Dependent Optimization
			4.1.2 Power and Delay Optimization
			4.1.3 Area Optimization
		4.2 Power Failure Resilient: NV-Clustering Design Methodology
			4.2.1 Logic-Embedded FF (LE-FF) Design
			4.2.2 NV-Clustering Methodology
			4.2.3 Simulation Results
		4.3 Power Analysis Resilient: PARC Design Methodology
			4.3.1 PARC Design Methodology
	5 Conclusion
	References
IoT Commercial and Industrial Applications and AI-Powered IoT
	1 Introduction
	2 IoT Commercial Applications
		2.1 Healthcare
			2.1.1 Clinical Sensors
			2.1.2 Nonclinical Sensors
		2.2 Tourism and Hospitality
		2.3 Retail Industry
		2.4 Digital Marketing
	3 IoT Commercial Applications
		3.1 Agriculture
			3.1.1 Field Sensors
			3.1.2 Climate Sensors
		3.2 Oil and Gas Mining
			3.2.1 Smart Pipelines
			3.2.2 Lone Worker Monitoring
			3.2.3 Safety and Security
		3.3 Wearables
			3.3.1 Fitness Trackers
			3.3.2 Smartwatches
			3.3.3 Accelerometers
		3.4 Smart Cities
			3.4.1 Environmental Monitoring
		3.5 Smart Buildings
		3.6 Maintenance Management
		3.7 Water Supply
		3.8 Manufacturing
		3.9 Transportation
		3.10 Warehouses
	4 IoT Security and Privacy Issues
		4.1 IoT Malware
		4.2 Encrypted Threats
		4.3 Perception Layer
			4.3.1 Node Capture
			4.3.2 Replay Attack
			4.3.3 Malicious Node
		4.4 Network Layer
			4.4.1 DDoS (Distributed Denial-of-Service) Attack
			4.4.2 Man-in-the-Middle Attack
			4.4.3 Spoofing Attack
			4.4.4 Wormhole Attack
			4.4.5 Black Hole Attack or Drop Attack
			4.4.6 Sybil Attack
			4.4.7 Sinkhole Attack
			4.4.8 Malicious Code Injection
		4.5 Application Layer
			4.5.1 Cross-Site Scripting
			4.5.2 Privacy and Confidentiality
	5 IoT Data Analytics
	6 AI-Powered IoT
		6.1 Benefits of AI-Powered IoT
			6.1.1 Boosting Operational Efficiency
			6.1.2 Better Risk Management
			6.1.3 Triggering New and Enhanced Products and Services
			6.1.4 Increase IoT Scalability
			6.1.5 Eliminates Costly Unplanned Downtime
			6.1.6 Smart Thermostat
	7 Conclusion
	References
Hardware and System Security: Attacks and Countermeasures Against Hardware Trojans
	1 Introduction
	2 IC Supply Chain
	3 HT Structure
	4 HT Models
	5 HT Attacks
	6 HT Taxonomy
	7 Challenges Against HTs
	8 Structure and Purpose of the Chapter
	9 An Overview of Artificial Intelligence
		9.1 Artificial Intelligence Term
		9.2 Machine Learning Term
		9.3 Deep Learning Term
	10 Tasks of Learning
		10.1 Supervised Learning
		10.2 Unsupervised Learning
		10.3 Semi-supervised Learning
	11 Learning Models
		11.1 Artificial Neural Network Models
		11.2 Bayesian Models
		11.3 Clustering Models
		11.4 Computer Vision Models
		11.5 Decision Tree Models
		11.6 Deep Learning Models
		11.7 Dimensionality Reduction Models
		11.8 Ensemble Learning Models
		11.9 Generative Learning Models
		11.10 Instance-Based Models
		11.11 Natural Language Processing Models
		11.12 Regression Models
		11.13 Regularization Models
		11.14 Speech Recognition Models
	12 AI History Timeline
	13 Countermeasures Against HTs
	14 Historical Throwback
	15 Studies Trend
	16 Side-Channel Analysis-Based Approaches
		16.1 SCA Power Analysis-Based Approaches
		16.2 SCA Time Analysis-Based Approaches
	17 ML and Simulation-Based Approaches
		17.1 Logic Testing Simulation Approaches
		17.2 ML-Based Approaches
	18 Auxiliary Approaches
		18.1 Runtime Monitoring Approaches
		18.2 Prevention and Facilitation Approaches
	19 Build Your Model Against HTs
		19.1 Dataset
		19.2 Training of Our ML- and DL-Based Models
			19.2.1 Gradient-Boosting Algorithm
			19.2.2 K-Nearest Neighbor Algorithm
			19.2.3 Multilayer Perceptron Algorithm
			19.2.4 Random Forest Algorithm
			19.2.5 Support Vector Machine Algorithm
			19.2.6 GAN Algorithm
			19.2.7 CGAN Algorithm
			19.2.8 WGAN Algorithm
		19.3 Evaluation
			19.3.1 Metrics for Classification ML-Based Algorithms
			19.3.2 Metrics for the Evaluation of GL-Based Algorithms
		19.4 Hyperparameter Tuning
	20 Languages, Frameworks, and Tools
	21 Conclusions
	References
FPGA Security: Security Threats from Untrusted FPGA CADToolchain
	1 Introduction
	2 Commercial and Open-Source FPGA CAD Tools
	3 Security Threats from FPGA CAD Tools
		3.1 Security Threats in Commercial FPGA CAD Tool
			3.1.1 Attacks on Xilinx ISE
			3.1.2 Attacks on Altera Quartus
			3.1.3 Attack Surfaces Induced by Integrating Countermeasures to Commercial CAD Tools
		3.2 Security Threats in Open-Source FPGA CAD Tool
			3.2.1 Potential Attacks on VTR
			3.2.2 Potential Attacks on Symbiflow
			3.2.3 Practical Attacks Using Open-Source FPGA CAD Tools
			3.2.4 Generalized Attack Flow in Open-Source FPGA CAD Tools
	4 New Security Threat Landscape
		4.1 New FPGA Utilization Model
		4.2 New FPGA Security Challenges
		4.3 Comprehensive Summary of Attack Surfaces
	5 Conclusion and Future Research Directions
	References
DoS Attack Models and Mitigation Frameworks for NoC-Based SoCs
	1 Introduction
	2 Threat Model
		2.1 Wired NoC Threat Model
		2.2 Wireless NoC Threat Model
	3 DoS Attack Detection and Localization in wired NoC-Based SoCs
		3.1 Attack Detection Framework
			3.1.1 First-Level Sanity Check
			3.1.2 Machine Learning for Attack Detection
			3.1.3 Results and Analysis
		3.2 Attack Localization Framework
			3.2.1 Machine Learning for Localization
			3.2.2 Algorithm for MIP Localization
			3.2.3 Walk-Through Example
		3.3 Results and Analysis
	4 DoS Attack Detection and Localization in WNoC-Based SoCs
		4.1 Possible Threat Model
			4.1.1 Attacks on WNoC CAM
			4.1.2 Trojan Attack Activation
		4.2 Security Countermeasures
			4.2.1 Ranking Based CAM
			4.2.2 Attack Detection and Correction
		4.3 Experimental Setup and Results
	5 Conclusion and Future Work
	References
Defense against Security Threats with Regard to SoC Life Cycle
	1 Motivation
	2 Security Threats with Regard to SoC Life Cycle and Supply Chain
	3 Sources of Attacks in SoCs
		3.1 Design Stage
		3.2 Synthesis RTL to Layout
		3.3 Fabrication and Manufacturing
		3.4 In-Field Attacks
	4 Threat Model
		4.1 Hardware Trojan Attacks
		4.2 Side-Channel Attacks
		4.3 Fault Injection Attacks
		4.4 Test-Infrastructure-Based Attacks
			4.4.1 Differential Scan Attack (DSA)
			4.4.2 Test-Mode-Only (TMO) Attack
	5 Defense Against the Security Threats
		5.1 State-of-the-Art Techniques for Hardware Trojan Detection
		5.2 Countermeasures Against Side-Channel Attacks (SCA)
		5.3 Countermeasures Against Fault Injection Attacks
		5.4 Countermeasures Against Test-Infrastructure-Based Attacks
			5.4.1 Countermeasures Against DSA Only
			5.4.2 Countermeasures Against Test-Mode-Only Attack
			5.4.3 Unified Countermeasures
	6 Summary
	References
Defect Diagnosis Techniques for Silicon Customer Returns
	1 Introduction
	2 Background on Test and Fault Diagnosis
		2.1 From Defects to Failures
		2.2 Testing
		2.3 Fault Diagnosis
			2.3.1 System-Level Fault Diagnosis
			2.3.2 Digital Block-Level Fault Diagnosis
			2.3.3 Cell-Aware Fault Diagnosis
	3 Test of Customer Returns for Diagnosis Purpose
		3.1 Typical Test Scenario
		3.2 Limitation of Manufacturing Test for Customer Returns
		3.3 Best Practices for Customer Return Test Pattern Generation
	4 Defect Diagnosis Techniques for Customer Returns
		4.1 Conventional Approaches
			4.1.1 Diagnosis Using Fault Simulation
			4.1.2 Diagnosis Using Critical Path Tracing
		4.2 Advanced Methods Based on Machine Learning
			4.2.1 Preliminaries
			4.2.2 Learning-Based Cell-Aware Diagnosis Flow
	5 Industrial Case Studies
		5.1 Simulated Test Case Studies
		5.2 Silicon Test Case Study
	6 Discussion and Conclusion
	References
Index




نظرات کاربران