574 research outputs found
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL
Split manufacturing was introduced as an effective countermeasure against
hardware-level threats such as IP piracy, overbuilding, and insertion of
hardware Trojans. Nevertheless, the security promise of split manufacturing has
been challenged by various attacks, which exploit the well-known working
principles of physical design tools to infer the missing BEOL interconnects. In
this work, we advocate a new paradigm to enhance the security for split
manufacturing. Based on Kerckhoff's principle, we protect the FEOL layout in a
formal and secure manner, by embedding keys. These keys are purposefully
implemented and routed through the BEOL in such a way that they become
indecipherable to the state-of-the-art FEOL-centric attacks. We provide our
secure physical design flow to the community. We also define the security of
split manufacturing formally and provide the associated proofs. At the same
time, our technique is competitive with current schemes in terms of layout
overhead, especially for practical, large-scale designs (ITC'99 benchmarks).Comment: DATE 2019 (https://www.date-conference.com/conference/session/4.5
Early cretaceous palynomorphs from the zuata area, eastern Venezuela
Este trabalho é baseado em estudos palinológicos e petrográficos do testemunho de um poço (MARAVEN, S. A.) situado na área de Zuata, Venezuela. Os palinomorfos recuperados são atribuídos a 19 gêneros e 33 espécies de esporos e 9 gêneros e 26 espécies de pólen. A idade indicada é, mais provavelmente, ?Aptiano-Albiano médio inferior. São feitas comparações com modelos já estabelecidos de províncias microflorísticas do Cretáceo Inferior (BRENNER, 1976; HERNGREEN, 1976, 1981) e as implicações discutidas. Estudos palinológicos e sedimentológicos sugerem um ambiente de deposição fluvial, sob condições áridas, numa região topograficamente pouco movimentadaThis report is based on palynological and petrographical studies of a core from a Zuata área well (MARAVEN, S. A.). Palynomorphs encountered have been assigned to 19 genera and 33 species of spores and 9 genera and 26 species of pollen grains. The most probable age is ?Aptian-Early Middle Albian. A comparison with previously published Early Cretaceous microfloral province concepts (BRENNER, 1976; HERNGREEN, 1976, 1981) has been made and implications are discussed. Palynological and sedimentological studies suggest a fluvial environment in arid conditions on a flat topograph
Graph Neural Networks for Hardware Vulnerability Analysis -- Can you Trust your GNN?
The participation of third-party entities in the globalized semiconductor
supply chain introduces potential security vulnerabilities, such as
intellectual property piracy and hardware Trojan (HT) insertion. Graph neural
networks (GNNs) have been employed to address various hardware security
threats, owing to their superior performance on graph-structured data, such as
circuits. However, GNNs are also susceptible to attacks. This work examines the
use of GNNs for detecting hardware threats like HTs and their vulnerability to
attacks. We present BadGNN, a backdoor attack on GNNs that can hide HTs and
evade detection with a 100% success rate through minor circuit perturbations.
Our findings highlight the need for further investigation into the security and
robustness of GNNs before they can be safely used in security-critical
applications.Comment: Will be presented at 2023 IEEE VLSI Test Symposium (VTS
- …