{"title":"AutoDetect: Novel Autoencoding Architecture for Counterfeit IC Detection","authors":"Chaitanya Bhure, Geraldine Shirley Nicholas, Shajib Ghosh, Navid Asadi, F. Saqib","doi":"10.1007/s41635-024-00149-3","DOIUrl":"https://doi.org/10.1007/s41635-024-00149-3","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"19 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141106848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guarding Against the Unknown: Deep Transfer Learning for Hardware Image-Based Malware Detection","authors":"Z. He, H. Homayoun, H. Sayadi","doi":"10.1007/s41635-024-00146-6","DOIUrl":"https://doi.org/10.1007/s41635-024-00146-6","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"46 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140238580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Post-configuration Activation of Hardware Trojans in FPGAs","authors":"Qazi Arbab Ahmed, T. Wiersema, Marco Platzner","doi":"10.1007/s41635-024-00147-5","DOIUrl":"https://doi.org/10.1007/s41635-024-00147-5","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"230 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140247115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pallabi Ghosh, Gijung Lee, Mengdi Zhu, Olivia P. Dizon-Paradis, Ulbert J. Botero, Damon L. Woodard, Domenic Forte
{"title":"MaGNIFIES: Manageable GAN Image Augmentation Framework for Inspection of Electronic Systems","authors":"Pallabi Ghosh, Gijung Lee, Mengdi Zhu, Olivia P. Dizon-Paradis, Ulbert J. Botero, Damon L. Woodard, Domenic Forte","doi":"10.1007/s41635-024-00145-7","DOIUrl":"https://doi.org/10.1007/s41635-024-00145-7","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"135 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140451799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning-Based Security Evaluation and Overhead Analysis of Logic Locking","authors":"Yeganeh Aghamohammadi, Amin Rezaei","doi":"10.1007/s41635-024-00144-8","DOIUrl":"https://doi.org/10.1007/s41635-024-00144-8","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"16 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139609481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Quantum Artificial Intelligence Electromagnetic Spectrum Analysis Framework for Transportation System Security","authors":"V. M. Vaidyan, B. Rimal","doi":"10.1007/s41635-023-00142-2","DOIUrl":"https://doi.org/10.1007/s41635-023-00142-2","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":" 39","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139144785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EXERTv2: Exhaustive Integrity Analysis for Information Flow Security with FSM Integration","authors":"Jiaming Wu, Domenic Forte","doi":"10.1007/s41635-023-00141-3","DOIUrl":"https://doi.org/10.1007/s41635-023-00141-3","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"23 33","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139156145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Versatile and Flexible Multiplier Generator for Large Integer Polynomials","authors":"Malik Imran, Zainal Abideen, S. Pagliarini","doi":"10.1007/s41635-023-00134-2","DOIUrl":"https://doi.org/10.1007/s41635-023-00134-2","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128260501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CROWBAR: Natively Fuzzing Trusted Applications Using ARM CoreSight","authors":"Haoqi Shan, Moyao Huang, Yujia Liu, Sravani Nissankararao, Yier Jin, Shuo Wang, Dean Sullivan","doi":"10.1007/s41635-023-00133-3","DOIUrl":"https://doi.org/10.1007/s41635-023-00133-3","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133916476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Koblah, Olivia P. Dizon-Paradis, Justin Schubeck, Ulbert J. Botero, D. Woodard, Domenic Forte
{"title":"A Comprehensive Taxonomy of Visual Printed Circuit Board Defects","authors":"D. Koblah, Olivia P. Dizon-Paradis, Justin Schubeck, Ulbert J. Botero, D. Woodard, Domenic Forte","doi":"10.1007/s41635-023-00132-4","DOIUrl":"https://doi.org/10.1007/s41635-023-00132-4","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"117 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125722111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}