Special Issue "Circuits and Systems of Security Applications"

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Circuit and Signal Processing".

Deadline for manuscript submissions: 31 October 2022.

Special Issue Editor

Prof. Dr. Paris Kitsos
E-Mail Website
Guest Editor
Electrical & Computer Engineering Department, University of the Peloponnese, Greece
Interests: integrated circuit design for security systems, encryption algorithms and signal processing systems; methods of searching for hardware trojans in integrated circuits; hardware design for embedded systems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Hardware security is a major area of investigation because it can deliver significant benefits at the device level, such as robust, tamper-resistant storage of keys, integrated cryptographic primitives, secure communication between devices, protection against both virtual and physical attacks, authorization and authentication between the devices, and many others.
So, this Special Issue provides an opportunity to present new results from both the research and industry communities. We invite you to submit high quality papers to this Special Issue on “Circuits and Systems of Security Applications”, with subjects covering all aspects of embedded, HW/SW design and VLSI implementations. The topics include, but are not limited to:

•    Hardware security primitives;
•    Applications of secure hardware;
•    Attacks against hardware implementations and countermeasures;
•    Hardware Trojans – backdoors and detection techniques;
•    IC Trust and anti-Counterfeiting;
•    Reverse engineering and hardware obfuscation;
•    Hardware security primitives: PUFs and TRNGs;
•    Security architectures in Embedded Systems;
•    Protection of Industrial Internet of Things (IIoT);
•    Protection of Internet of Things (IoT);
•    Security architectures for pervasive computing and wireless applications/protocols;
•    Secure System-on-Chip (SoC) designs;
•    Lightweight cryptography and implementations;
•    FPGA and reconfigurable fabric security;
•    Cyber-physical system security.


Prof. Dr. Paris Kitsos
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:


GAINESIS: Generative Artificial Intelligence NEtlists SynthesIS
Electronics 2022, 11(2), 245; https://doi.org/10.3390/electronics11020245 - 13 Jan 2022
Viewed by 110
A significant problem in the field of hardware security consists of hardware trojan (HT) viruses. The insertion of HTs into a circuit can be applied for each phase of the circuit chain of production. HTs degrade the infected circuit, destroy it or leak [...] Read more.
A significant problem in the field of hardware security consists of hardware trojan (HT) viruses. The insertion of HTs into a circuit can be applied for each phase of the circuit chain of production. HTs degrade the infected circuit, destroy it or leak encrypted data. Nowadays, efforts are being made to address HTs through machine learning (ML) techniques, mainly for the gate-level netlist (GLN) phase, but there are some restrictions. Specifically, the number and variety of normal and infected circuits that exist through the free public libraries, such as Trust-HUB, are based on the few samples of benchmarks that have been created from circuits large in size. Thus, it is difficult, based on these data, to develop robust ML-based models against HTs. In this paper, we propose a new deep learning (DL) tool named Generative Artificial Intelligence Netlists SynthesIS (GAINESIS). GAINESIS is based on the Wasserstein Conditional Generative Adversarial Network (WCGAN) algorithm and area–power analysis features from the GLN phase and synthesizes new normal and infected circuit samples for this phase. Based on our GAINESIS tool, we synthesized new data sets, different in size, and developed and compared seven ML classifiers. The results demonstrate that our new generated data sets significantly enhance the performance of ML classifiers compared with the initial data set of Trust-HUB. Full article
(This article belongs to the Special Issue Circuits and Systems of Security Applications)
Show Figures

Figure 1

Back to TopTop