The increase in the number of counterfeit and recycled microelectronic c...
Artificial intelligence (AI) and machine learning (ML) techniques have b...
The threat of hardware Trojans (HTs) and their detection is a widely stu...
Side-channel and fault injection attacks reveal secret information by
mo...
The security of modern electronic devices relies on secret keys stored o...
Due to its sound theoretical basis and practical efficiency, masking has...
The current chapter aims at establishing a relationship between artifici...
This chapter is on the security assessment of artificial intelligence (A...
Logic locking has emerged as a promising solution for protecting the
sem...