Abstract is missing.
- Characterization and Test of Intermittent Over RESET in RRAMsHanzhi Xun, Moritz Fieback, Sicong Yuan, Hassen Aziza, Mathijs Heidekamp, Thiago Copetti, LetĂcia Maria Veiras Bolzani Poehls, Mottaqiallah Taouil, Said Hamdioui. 1-6 [doi]
- Industry Session I: On Automotive TestingFan Yang, Tedder Meng, Zhifang Zhang, Yu Huang. 1 [doi]
- Device Aware Diagnosis for Unique Defects in STT-MRAMsAhmed Aouichi, Sicong Yuan, Moritz Fieback, Siddharth Rao, Woojin Kim, Erik Jan Marinissen, Sebastien Couet, Mottaqiallah Taouil, Said Hamdioui. 1-6 [doi]
- A Logic Encryption-Enhanced PUF Architecture to Deceive Machine Learning-Based Modeling AttacksLirong Zhou, Junjun Wang, Zhao Huang, Lu Fan, Quan Wang 0006, Jinhui Liu, Bo Wan. 1-6 [doi]
- ClearLock: Deterring Hardware Reverse Engineering Attacks in a White-BoxLeon Li, Alex Orailoglu. 1-6 [doi]
- MMFuzz: Towards Enhancing RTL Fuzz Testing Using Metric Feedbacks Based on Markov ChainYue Cheng, Hongji Zou, Jiayu He, Chen Chen, Tun Li, Han Long. 1-6 [doi]
- Enabling Inter-Product Transfer Learning on MCU Performance ScreeningNicolò Bellarmino, Riccardo Cantoro, Martin Huch, Tobias Kilian, Ulf Schlichtmann, Giovanni Squillero. 1-6 [doi]
- Fault Diagnosis of Analog Circuits Based on Multi-Scale 1D Convolutional Neural NetworkWeiwei Wang, Yongchao Zhang, Feng You, Zhigang Yin, Ruilian Zhao. 1-6 [doi]
- Fault Simulation Acceleration Based on ARM Multi-core CPU ArchitectureShi-Jie Ye, Yun-Ju Liu, Liuzheng Wang, Hui-Ling Zhen, Wei Ming Zhang, Yu Huang. 1-5 [doi]
- Signal Reduction of Signature Blocks for Transient Fault DebuggingChun-Yeh Wang, Chien-Hsing Liang, Jing-Jia Liou, Harry H. Chen. 1-6 [doi]
- A Comparison Study of the Compatibility Approaches for SGX EnclavesJinhua Cui 0002, Yiyun Yin, Zhiping Cai, Jiliang Zhang 0002. 1-6 [doi]
- Security Verification of RISC-V System Based on ISA Level Information Flow TrackingLingjuan Wu, Yifei Gao, Jiacheng Zhu, Yu Tai, Wei Hu 0008. 1-6 [doi]
- Optimizing the Streaming of Sensor Data with Approximate CommunicationSomayeh Sadeghi Kohan, Jan Dennis Reimer, Sybille Hellebrand, Hans-Joachim Wunderlich. 1-6 [doi]
- Template-Based and Coverage-Guided Verification Instruction Set Automatic Generation Method for DSP ChipYing Shang, Kun Chang, Ruilian Zhao, Zhigang Yin. 1-6 [doi]
- Intelligent Automatic Test Pattern Generation for Digital Circuits Based on Reinforcement LearningWenxing Li, Hongqin Lyu, Shengwen Liang, Tiancheng Wang, Pengyu Tian, Huawei Li 0001. 1-6 [doi]
- Reliability Analysis of Approximate Multipliers with Recovery SchemesTamaki Kozuma, Qilin Wang, Hideyuki Ichihara, Tomoo Inoue. 1-6 [doi]
- Message from the ChairsHuawei Li 0001, Jing Ye 0001, Wei Hu, Jiliang Zhang 0002. 1 [doi]
- On Tolerating Variations and Faults in Memristor Crossbar Based Neural Network Accelerators by Network Expansion and Weight ZeroingChengzhen Yang, Song Jin, Jianhuang Shen, Zhuo Wang. 1-6 [doi]
- ECSAS: Exploring Critical Scenarios from Action Sequence in Autonomous DrivingShuting Kang, Heng Guo, Peng Su, Lijun Zhang, Guangzhen Liu, Yunzhi Xue, Yanjun Wu. 1-6 [doi]
- Enhancing Defect Diagnosis and Localization in Wafer Map Testing Through Weakly Supervised LearningMu Nie, Wen Jiang, Wankou Yang, Senling Wang, Xiaoqing Wen, Tianming Ni. 1-6 [doi]
- A Portable Hardware Trojan Detection Using Graph Attention NetworksHan Zhang, Yinhao Zhou, Ying Li. 1-6 [doi]
- Configurable and High-Level Pipelined Lattice-Based Post Quantum Cryptography Hardware Accelerator DesignJianan Mu, Huajie Tan, Shuai Chen, Min Cai, Jing Ye 0001, Huawei Li 0001, Xiaowei Li 0001. 1-6 [doi]
- A Template Attack on Reduction Without Reference Device on KyberYipei Yang, Junying Huang, Zongyue Wang, Jing Ye 0001, Zihao Sun, Junfeng Fan, Shuai Chen, Huawei Li 0001, Xiaowei Li 0001, Yuan Cao 0003. 1-6 [doi]
- A High-Performance and P-Type FeFET-Based Non-Volatile LatchAibin Yan, Yu Chen, Zhengfeng Huang, Jie Cui 0004, Xiaoqing Wen. 1-5 [doi]
- Advanced DICE Based Triple-Node-Upset Recovery Latch with Optimized Overhead for Space ApplicationsAibin Yan, Xuehua Li, Zhongyu Gao, Zhengfeng Huang, Tianming Ni, Xiaoqing Wen. 1-5 [doi]
- Side-channel Attacks on Memristive Circuits Under External DisturbancesLi-Wei Chen, Xianyue Zhao, Ziang Chen, Nan Du, Ilia Polian. 1-6 [doi]
- A Distributed ATPG System Combining Test Compaction Based on Pure MaxSATZhiteng Chao, Senlin Wang, Pengyu Tian, Shuwen Yuan, Huawei Li 0001, Jing Ye 0001, Xiaowei Li 0001. 1-6 [doi]
- Survey on Traffic Flow-Based Autonomous Driving Simulation TestsYongquan Tan, Yukuan Yang, Hongping Ren, Zhuokun Yang, Qian Dong, Yunzhi Xue. 1-6 [doi]
- HTrans: Transformer-Based Method for Hardware Trojan Detection and LocalizationYilin Li, Shan Li, Haihua Shen. 1-6 [doi]
- Adversarial Testing: A Novel On-Line Testing Method for Deep Learning ProcessorsWen Li, Ying Wang 0001, Kaiwei Zou, Huawei Li 0001, Xiaowei Li 0001. 1-6 [doi]
- Improve Volume Physical-Aware Diagnosis via Active Pattern SamplingJiaxing Gao, Baohua Wang, Yin Zhang, Yu Huang, Xiaotian Ding, Weiming Zhang. 1-6 [doi]
- A Survey on Fault-Tolerance Methods for SRAM-Based FPGAs in Radiation EnvironmentsZhaojun Lu, Qi Zhao, Qidong Chen, Jiliang Zhang 0002. 1-6 [doi]
- A Covert Attack Method Against FPGA CloudsShe Tang, Jian Wang 0024, Zhe Chen, Shize Guo. 1-6 [doi]
- SMASh: A State Encoding Methodology Against Attacks on Finite State MachinesGowthami Konganapalle, Sonali Shukla, Virendra Singh. 1-6 [doi]
- An Empirical Study of the Inherent Resistance of Knowledge Distillation Based Federated Learning to Targeted Poisoning AttacksWeiyang He, Zizhen Liu, Chip-Hong Chang. 1-6 [doi]
- Software Fault Localization Based on Combining Information Retrieval and Mutation AnalysisLei Yue, Jingwen Li, Liwei Zheng, Li Li, Zhanqi Cui. 1-6 [doi]
- Automatic Identification of Functionally Untestable Cell-Aware Faults in MicroprocessorsNikolaos Ioannis Deligiannis, Tobias Faller, Iacopo Guglielminetti, Riccardo Cantoro, Bernd Becker 0001, Matteo Sonza Reorda. 1-6 [doi]
- FPGA-Based Cross-Hardware MBU Emulation Platform for Layout-Level Digital VLSIXin Chen, Liangzhou Huo, Yudong Xie, Zhihao Shen, Zhiqiang Xiang, Changhao Gao, Ying Zhang. 1-6 [doi]
- A Low-Delay Quadruple-Node-Upset Self-Recoverable Latch DesignShuo Cai, Jiangbiao Ouyang, Yan Wen, Weizheng Wang, Fei Yu 0009. 1-5 [doi]
- On Detecting and Defending AdvDrop Adversarial Attacks by Image Blurring and Adaptive NoisingHequan Zhang, Song Jin. 1-6 [doi]
- Verifying RISC-V Privilege Transition Integrity Through Symbolic ExecutionShibo Tang, Jiacheng Zhu, Yifei Gao, Jing Zhou, Dejun Mu, Wei Hu 0008. 1-6 [doi]
- Industry Session II: DFT on AI ChipsJunna Zhong, Iris Ma, Hailong Li, Yu Huang. 1 [doi]
- A Case Study on Formally Verifying an Open-source Deep Learning Accelerator DesignAnshul Jain, Binod Kumar. 1-6 [doi]
- On Enhancing the Security of Streaming Scan Network ArchitectureGaurav Kumar, Anjum Riaz, Yamuna Prasad, Satyadev Ahlawat. 1-6 [doi]