Zobrazeno 1 - 10
of 16 309
pro vyhledávání: '"Badawy AS"'
Traditionally, inserting realistic Hardware Trojans (HTs) into complex hardware systems has been a time-consuming and manual process, requiring comprehensive knowledge of the design and navigating intricate Hardware Description Language (HDL) codebas
Externí odkaz:
http://arxiv.org/abs/2412.02816
As mobile systems become more advanced, the security of System-on-Chips (SoCs) is increasingly threatened by thermal attacks. This research introduces a new attack method called the Multi-stage Adaptive Thermal Trojan for Efficiency and Resilience De
Externí odkaz:
http://arxiv.org/abs/2412.00226
Reuse distance analysis is a widely recognized method for application characterization that illustrates cache locality. Although there are various techniques to calculate the reuse profile from dynamic memory traces, it is both time and space-consumi
Externí odkaz:
http://arxiv.org/abs/2411.13854
Fine-grained power estimation in multicore Systems on Chips (SoCs) is crucial for efficient thermal management. BPI (Blind Power Identification) is a recent approach that determines the power consumption of different cores and the thermal model of th
Externí odkaz:
http://arxiv.org/abs/2410.21261
Distracted driving is a critical safety issue that leads to numerous fatalities and injuries worldwide. This study addresses the urgent need for efficient and real-time machine learning models to detect distracted driving behaviors. Leveraging the Pr
Externí odkaz:
http://arxiv.org/abs/2410.15602
This work focuses on advancing security research in the hardware design space by formally defining the realistic problem of Hardware Trojan (HT) detection. The goal is to model HT detection more closely to the real world, i.e., describing the problem
Externí odkaz:
http://arxiv.org/abs/2410.15550
Modern multicore System-on-Chips (SoCs) feature hardware monitoring mechanisms that measure total power consumption. However, these aggregate measurements are often insufficient for fine-grained thermal and power management. This paper presents an en
Externí odkaz:
http://arxiv.org/abs/2409.18921
The Hardware Trojan (HT) problem can be thought of as a continuous game between attackers and defenders, each striving to outsmart the other by leveraging any available means for an advantage. Machine Learning (ML) has recently played a key role in a
Externí odkaz:
http://arxiv.org/abs/2405.15184
Autor:
Aktar, Shamminuj, Bärtschi, Andreas, Oyen, Diane, Eidenbenz, Stephan, Badawy, Abdel-Hameed A.
Parameterized quantum circuits (PQCs) are fundamental to quantum machine learning (QML), quantum optimization, and variational quantum algorithms (VQAs). The expressibility of PQCs is a measure that determines their capability to harness the full pot
Externí odkaz:
http://arxiv.org/abs/2405.08100
Autor:
van Driel, David, Koch, Rouven, Sietses, Vincent P. M., Haaf, Sebastiaan L. D. ten, Liu, Chun-Xiao, Zatelli, Francesco, Roovers, Bart, Bordin, Alberto, van Loo, Nick, Wang, Guanzhong, Wolff, Jan Cornelis, Mazur, Grzegorz P., Dvir, Tom, Kulesh, Ivan, Wang, Qingzhen, Bozkurt, A. Mert, Gazibegovic, Sasa, Badawy, Ghada, Bakkers, Erik P. A. M., Wimmer, Michael, Goswami, Srijit, Lado, Jose L., Kouwenhoven, Leo P., Greplova, Eliska
Contemporary quantum devices are reaching new limits in size and complexity, allowing for the experimental exploration of emergent quantum modes. However, this increased complexity introduces significant challenges in device tuning and control. Here,
Externí odkaz:
http://arxiv.org/abs/2405.04596