Search

Your search keyword '"Patnaik, Satwik"' showing total 162 results

Search Constraints

Start Over You searched for: Author "Patnaik, Satwik" Remove constraint Author: "Patnaik, Satwik"
162 results on '"Patnaik, Satwik"'

Search Results

1. AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning

2. Securing Cloud FPGAs Against Power Side-Channel Attacks: A Case Study on Iterative AES

3. UN-SPLIT: Attacking Split Manufacturing Using Link Prediction in Graph Neural Networks

4. PoisonedGNN: Backdoor Attack on Graph Neural Networks-based Hardware Security Systems

6. Hide & Seek: Seeking the (Un)-Hidden key in Provably-Secure Logic Locking Techniques

7. Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges

8. ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning

9. DETERRENT: Detecting Trojans using Reinforcement Learning

10. Embracing Graph Neural Networks for Hardware Security (Invited Paper)

11. MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction

12. UNTANGLE: Unlocking Routing and Logic Obfuscation Using Graph Neural Networks-based Link Prediction

13. UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking

14. GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking

15. 2.5D Root of Trust: Secure System-Level Integration of Untrusted Chiplets

16. Attacking Split Manufacturing from a Deep Learning Perspective

17. Power Side-Channel Attacks in Negative Capacitance Transistor (NCFET)

18. Obfuscating the Interconnects: Low-Cost and Resilient Full-Chip Layout Camouflaging

19. A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical Interconnects

20. Toward Physically Unclonable Functions from Plasmonics-Enhanced Silicon Disc Resonators

21. 3D Integration: Another Dimension Toward Hardware Security

22. An Interposer-Based Root of Trust: Seize the Opportunity for Secure System-Level Integration of Untrusted Chiplets

23. Spin-Orbit Torque Devices for Hardware Security: From Deterministic to Probabilistic Regime

24. SMART: Secure Magnetoelectric AntifeRromagnet-Based Tamper-Proof Non-Volatile Memory

25. Protect Your Chip Design Intellectual Property: An Overview

26. Best of Both Worlds: Integration of Split Manufacturing and Camouflaging into a Security-Driven CAD Flow for 3D ICs

27. Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices

28. Introduction

36. Raise Your Game for Split Manufacturing: Restoring the True Functionality Through BEOL

37. Advancing Hardware Security Using Polymorphic and Stochastic Spin-Hall Effect Devices

38. Concerted Wire Lifting: Enabling Secure and Cost-Effective Split Manufacturing

39. Obfuscating the Interconnects: Low-Cost and Resilient Full-Chip Layout Camouflaging

40. Rethinking Split Manufacturing: An Information-Theoretic Approach with Secure Layout Techniques

48. DETERRENT: Detecting Trojans Using Reinforcement Learning

Catalog

Books, media, physical & digital resources