Department

Computer Science and Cybersecurity

Document Type

Poster

Abstract

The increasing complexity of FPGA designs, particularly those incorporating AI and machine learning accelerators, makes it extremely difficult to manually analyze and secure the millions of configurable logic blocks and routing channels. Adversaries can exploit this complexity to embed sophisticated hardware Trojans or timing-based side-channel vulnerabilities that are undetectable by conventional verification tools. The current approach to Design for Security (DfS) is often a post-design afterthought rather than an integrated part of the development process. A critical research gap exists in leveraging the power of AI and machine learning to automatically identify and mitigate security vulnerabilities during the design and synthesis of FPGA bitstreams. This study focuses on Predictive Vulnerability Analysis, which involves training AI models on vast datasets of both secure and known-compromised FPGA designs. The model learns to predict potential vulnerabilities such as timing side-channels and Trojan insertion points early in the design phase, generating more secure, hardened bitstreams without sacrificing performance or efficiency.

Publication Date

12-4-2025

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.