Search Results for author: Ozgur Sinanoglu

Found 7 papers, 3 papers with code

Graph Neural Networks: A Powerful and Versatile Tool for Advancing Design, Reliability, and Security of ICs

1 code implementation29 Nov 2022 Lilas Alrahis, Johann Knechtel, Ozgur Sinanoglu

Graph neural networks (GNNs) have pushed the state-of-the-art (SOTA) for performance in learning and predicting on large-scale data present in social networks, biology, etc.

Security Closure of IC Layouts Against Hardware Trojans

no code implementations15 Nov 2022 Fangzhou Wang, Qijing Wang, Bangqi Fu, Shui Jiang, Xiaopeng Zhang, Lilas Alrahis, Ozgur Sinanoglu, Johann Knechtel, Tsung-Yi Ho, Evangeline F. Y. Young

In this work, we proactively and systematically harden the physical layouts of ICs against post-design insertion of Trojans.

GNN4REL: Graph Neural Networks for Predicting Circuit Reliability Degradation

1 code implementation4 Aug 2022 Lilas Alrahis, Johann Knechtel, Florian Klemme, Hussam Amrouch, Ozgur Sinanoglu

Without a precise understanding of the impact of variations on the delay of circuit paths, guardbands, which keep timing violations at bay, cannot be correctly estimated.

Attacking Split Manufacturing from a Deep Learning Perspective

no code implementations8 Jul 2020 Haocheng Li, Satwik Patnaik, Abhrajit Sengupta, Hao-Yu Yang, Johann Knechtel, Bei Yu, Evangeline F. Y. Young, Ozgur Sinanoglu

The notion of integrated circuit split manufacturing which delegates the front-end-of-line (FEOL) and back-end-of-line (BEOL) parts to different foundries, is to prevent overproduction, piracy of the intellectual property (IP), or targeted insertion of hardware Trojans by adversaries in the FEOL facility.

Obfuscating the Interconnects: Low-Cost and Resilient Full-Chip Layout Camouflaging

no code implementations14 Nov 2017 Satwik Patnaik, Mohammed Ashraf, Johann Knechtel, Ozgur Sinanoglu

Our scheme is based on obfuscating the interconnects (BEOL); it can be readily applied to any design without modifications in the device layer (FEOL).

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.