2021
DOI: 10.1109/mdat.2020.3013727
|View full text |Cite
|
Sign up to set email alerts
|

Hunting Security Bugs in SoC Designs: Lessons Learned

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…The password-based methods protect the JTAG access by requiring users to shift in a secret password. A static or short password is vulnerable to a brute-force attack [21]. Our work uses a different seed for different test data to authenticate the user instead of a static password.…”
Section: A Brute-force Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…The password-based methods protect the JTAG access by requiring users to shift in a secret password. A static or short password is vulnerable to a brute-force attack [21]. Our work uses a different seed for different test data to authenticate the user instead of a static password.…”
Section: A Brute-force Attackmentioning
confidence: 99%
“…They are also vulnerable to memory attacks if the passwords are stored in memory. In addition, if the authentication procedure compares a hardcoded password, it may also be cracked by the reverse engineering attack [21]. As for the CRP-based methods, they also take the risk of a memory attack.…”
Section: F Comparison With Other Workmentioning
confidence: 99%
“…Deep reinforcement learning is widely used in News Recommendation [1], face recognition [2], Image detection [3], task decision-making [4], etc. In terms of robots, deep reinforcement learning is also widely used in robot localization [5], perception [6], decision-making [7], planning [8], hardware [9], etc.…”
Section: Introductionmentioning
confidence: 99%