Keyphrases
Adversary
11%
AI-assisted Design
11%
AI-based Methods
100%
Assurance Technologies
11%
Attacker
11%
Backdoor
11%
Cyber Systems
11%
Design Process
11%
Design Recovery
22%
Educational Program
11%
Engineering Workflow
44%
Error-prone
11%
Fault-tolerant
11%
Gate-level Netlist
11%
Global Supply Chain
11%
Hardware Assurance
11%
Hardware Trojan
22%
IC Design
11%
Image Acquisition
11%
Impact Review
11%
Integrated Circuit Manufacturing
11%
Integrated Circuits
44%
Intellectual Property
100%
Intellectual Property Theft
22%
Manual Intervention
11%
Physical Design
11%
Privacy-preserving
11%
Recovery Approach
11%
Reverse Engineering
100%
Review Criteria
11%
Risk Analysis
11%
Sample Preparation
11%
Scanning Electron Microscope Image
100%
Scanning Electron Microscope Imaging
11%
Semiconductors
100%
Synthetic Images
11%
Tool Suite
11%
Untrusted Foundry
11%
Computer Science
And Gate
11%
Artificial Intelligence
100%
Attackers
11%
Backdoors
11%
Data Model
11%
Educational Programmes
11%
Fault Tolerant
11%
Image Acquisition
11%
Integrated Circuits
55%
Physical Design Process
11%
Privacy Preserving
11%
Reverse Engineering
100%
Risk Analysis
11%
Supply Chain
11%
Synthetic Image
11%