All Stories

  1. Energy Harvesting-Supported Efficient Low-Power ML Processing with Adaptive Checkpointing and Intermittent Computing
  2. Energy Harvesting-assisted Ultra-Low-Power Processing-in-Memory Accelerator for ML Applications
  3. Comprehensive Analysis of Consistency and Robustness of Machine Learning Models in Malware Detection
  4. The Fuzz Odyssey: A Survey on Hardware Fuzzing Frameworks for Hardware Design Verification
  5. Exploring Coverage Metrics in Hardware Fuzzing: A Comprehensive Analysis
  6. Resource- and Workload-aware Malware Detection through Distributed Computing in IoT Networks
  7. Special Session: Mitigating Side-channel Attacks through Circuit to Application Layer Approaches
  8. Don’t Cross Me! Cross-layer System Security
  9. FlutPIM:
  10. Hardware Trojan Detection Using Machine Learning: A Tutorial
  11. Breaking the Design and Security Trade-off of Look-up-table–based Obfuscation
  12. Silicon validation of LUT-based logic-locked IP cores
  13. LOCK&ROLL
  14. RAPTA: A Hierarchical Representation Learning Solution For Real-Time Prediction of Path-Based Static Timing Analysis
  15. Survey of Machine Learning for Electronic Design Automation
  16. RAFeL - Robust and Data-Aware Federated Learning-inspired Malware Detection in Internet-of-Things (IoT) Networks
  17. CAD-FSL: Code-Aware Data Generation based Few-Shot Learning for Efficient Malware Detection
  18. Securing Hardware via Dynamic Obfuscation Utilizing Reconfigurable Interconnect and Logic Blocks
  19. Energy-Efficient and Adversarially Robust Machine Learning with Selective Dynamic Band Filtering
  20. Adversarial Attack Mitigation Approaches Using RRAM-Neuromorphic Architectures
  21. A Reinforced Learning Solution for Clock Skew Engineering to Reduce Peak Current and IR Drop
  22. Adaptive Performance Modeling of Data-intensive Workloads for Resource Provisioning in Virtualized Environment
  23. Evolution of Defenses against Transient-Execution Attacks
  24. A Review of In-Memory Computing Architectures for Machine Learning Applications
  25. Unified Testing and Security Framework for Wireless Network-on-Chip Enabled Multi-Core Chips
  26. Application and Thermal-reliability-aware Reinforcement Learning Based Multi-core Power Management
  27. Adversarial Attack on Microarchitectural Events based Malware Detectors
  28. Computer-aided Arrhythmia Diagnosis with Bio-signal Processing
  29. Efficient utilization of adversarial training towards robust machine learners and its analysis
  30. ADDHard