All Stories

  1. Energy Harvesting-assisted Ultra-Low-Power Processing-in-Memory Accelerator for ML Applications
  2. Comprehensive Analysis of Consistency and Robustness of Machine Learning Models in Malware Detection
  3. The Fuzz Odyssey: A Survey on Hardware Fuzzing Frameworks for Hardware Design Verification
  4. Exploring Coverage Metrics in Hardware Fuzzing: A Comprehensive Analysis
  5. Resource- and Workload-aware Malware Detection through Distributed Computing in IoT Networks
  6. Special Session: Mitigating Side-channel Attacks through Circuit to Application Layer Approaches
  7. FlutPIM:
  8. Hardware Trojan Detection Using Machine Learning: A Tutorial
  9. Breaking the Design and Security Trade-off of Look-up-table–based Obfuscation
  10. Silicon validation of LUT-based logic-locked IP cores
  11. LOCK&ROLL
  12. RAPTA: A Hierarchical Representation Learning Solution For Real-Time Prediction of Path-Based Static Timing Analysis
  13. Survey of Machine Learning for Electronic Design Automation
  14. RAFeL - Robust and Data-Aware Federated Learning-inspired Malware Detection in Internet-of-Things (IoT) Networks
  15. CAD-FSL: Code-Aware Data Generation based Few-Shot Learning for Efficient Malware Detection
  16. Energy-Efficient and Adversarially Robust Machine Learning with Selective Dynamic Band Filtering
  17. Adversarial Attack Mitigation Approaches Using RRAM-Neuromorphic Architectures
  18. A Reinforced Learning Solution for Clock Skew Engineering to Reduce Peak Current and IR Drop
  19. Adaptive Performance Modeling of Data-intensive Workloads for Resource Provisioning in Virtualized Environment
  20. Evolution of Defenses against Transient-Execution Attacks
  21. A Review of In-Memory Computing Architectures for Machine Learning Applications
  22. Unified Testing and Security Framework for Wireless Network-on-Chip Enabled Multi-Core Chips
  23. Application and Thermal-reliability-aware Reinforcement Learning Based Multi-core Power Management
  24. Adversarial Attack on Microarchitectural Events based Malware Detectors
  25. Computer-aided Arrhythmia Diagnosis with Bio-signal Processing
  26. ADDHard