“Fuzzing for Automated SoC Security Verification: Challenges and Solution” (2024)
AUTHORS: M. Hossain, K. Z. Azar, F. Rahman, F. Farahmandi, and M. Tehranipoor Hardware-oriented fuzzing is an effective approach for
AUTHORS: M. Hossain, K. Z. Azar, F. Rahman, F. Farahmandi, and M. Tehranipoor Hardware-oriented fuzzing is an effective approach for
AUTHORS: D. Saha, S. Tarek, K. Yahyaei, S. Kumar, J. Zhuo, M. Tehranipoor, and F. Farahmandi As the ubiquity and
AUTHORS: A. Ayalasomayajula, N. Farzana, M. Tehranipoor, and F. Farahmandi The ubiquitous presence and utilization of System-on-Chips (SoCs) have made
AUTHORS: S. Rajendran, N. Farzana, S. Tarek, H. Kamali, F. Farahmandi, and M. Tehranipoor Due to the increasing size and
AUTHORS: N. Farzana, A. Ayalasomayajula, M. Tehranipoor, and F. Farahmandi The globalization of the System-on-Chip (SoC) design process has made
AUTHORS: L. Biswas, L. Lavdas, T. Rahman, M. Tehranipoor, and N. Asadi Various probing methodologies have been developed in the
AUTHORS: N. Pundir, J. Park, F. Farahmandi, and M. Tehranipoor Power side-channel (PSC) attacks received significant attention over the past
AUTHORS: T. Zhang, J. Park, M. Tehranipoor, and F. Farahmandi Power side-channel attacks (SCAs) exploit leakage from cryptographic implementations to
AUTHORS: N. Farzana, F. Farahmandi, and M. Tehranipoor A system-on-chip (SoC) security can be weakened by exploiting the potential vulnerabilities
AUTHORS: T. Rahman, S. M. Rahman, S. Tajik, M. Tehranipoor, and N. Asadi Logic locking has been proposed as an