No abstract available.
Proceeding Downloads
Blockchain-Enabled Whitelisting Mechanisms for Enhancing Security in 3D ICs
The globalization of the semiconductor supply chain has paved the way for a rapid enhancement in the research and development, and the production of electronic devices. The exponential growth in manufacturing, design, and distribution has given rise to a ...
SeeMLess: Security Evaluation of Logic Locking using Machine Learning oriented Estimation
Although logic locking has been widely known as a promising countermeasure against intellectual property (IP) piracy and overproduction risks, it has been challenged by different attack breeds over the years. Attacks on logic locking, either algorithmic ...
Extended Abstract: Pre-Silicon Vulnerability Assessment for AI/ML Hardware
Machine learning (ML) and artificial intelligence (AI) applications have become crucial for current and future information systems. Meanwhile, hardware security threats are emerging for AI/ML applications, such as the possibility of private input/model ...
Evolutionary Large Language Models for Hardware Security: A Comparative Survey
Automating hardware (HW) security vulnerability detection and mitigation during the design phase is imperative for two reasons: (i) It must be before chip fabrication, as post-fabrication fixes can be costly or even impractical; (ii) The size and ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
GLSVLSI '18 | 197 | 48 | 24% |
GLSVLSI '17 | 197 | 48 | 24% |
GLSVLSI '16 | 197 | 50 | 25% |
GLSVLSI '15 | 148 | 41 | 28% |
GLSVLSI '14 | 179 | 49 | 27% |
GLSVLSI '13 | 238 | 76 | 32% |
Overall | 1,156 | 312 | 27% |