Machine Learning vs. Hardware Integrity Protection - Dominik Sisejkovic - Ekoparty 2021: Hardware Hacking Space

Machine Learning vs. Hardware Integrity Protection - Dominik Sisejkovic - Ekoparty 2021: Hardware Hacking Space

Ekoparty Security Conference via YouTube Direct link

Design dependent trojans

5 of 13

5 of 13

Design dependent trojans

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Machine Learning vs. Hardware Integrity Protection - Dominik Sisejkovic - Ekoparty 2021: Hardware Hacking Space

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Motivation
  3. 3 untrusted IC supply chain
  4. 4 Hardware trojans
  5. 5 Design dependent trojans
  6. 6 Reverse engineering
  7. 7 Logic locking
  8. 8 Attack model
  9. 9 Schemes
  10. 10 Exploitation
  11. 11 Snapshot
  12. 12 Oracle Guided Attacks
  13. 13 Preventing ML Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.