Ten years of hardware Trojans: a survey from the attacker's perspective

M Xue, C Gu, W Liu, S Yu… - IET Computers & Digital …, 2020 - Wiley Online Library
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …

[HTML][HTML] Hardware trojans in chips: A survey for detection and prevention

C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen - Sensors, 2020 - mdpi.com
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …

Online anomaly detection in surveillance videos with asymptotic bound on false alarm rate

K Doshi, Y Yilmaz - Pattern Recognition, 2021 - Elsevier
Anomaly detection in surveillance videos is attracting an increasing amount of attention.
Despite the competitive performance of recent methods, they lack theoretical performance …

Detecting hardware trojans in PCBs using side channel loopbacks

H Pearce, VR Surabhi, P Krishnamurthy… - … Transactions on Very …, 2022 - ieeexplore.ieee.org
Malicious modifications to printed circuit boards (PCBs) are known as hardware Trojans.
These may arise when malafide third parties alter PCBs premanufacturing or …

Design of hardware trojans and its impact on cps systems: A comprehensive survey

A Dhavlle, R Hassan, M Mittapalli… - … on Circuits and …, 2021 - ieeexplore.ieee.org
The ever-increasing demand for sophisticated cyber-physical systems (CPS), combined with
the fabless model, led to vulnerability exploits in the IC supply chain, especially the insertion …

[HTML][HTML] Self-supervised learning for online anomaly detection in high-dimensional data streams

M Mozaffari, K Doshi, Y Yilmaz - Electronics, 2023 - mdpi.com
In this paper, we address the problem of detecting and learning anomalies in high-
dimensional data-streams in real-time. Following a data-driven approach, we propose an …

[HTML][HTML] Hardware Trojan Attacks on the Reconfigurable Interconnections of Field-Programmable Gate Array-Based Convolutional Neural Network Accelerators and a …

J Hou, Z Liu, Z Yang, C Yang - Micromachines, 2024 - mdpi.com
Convolutional neural networks (CNNs) have demonstrated significant superiority in modern
artificial intelligence (AI) applications. To accelerate the inference process of CNNs …

Scalable detection of hardware trojans using ATPG-based activation of rare events

A Jayasena, P Mishra - … Aided Design of Integrated Circuits and …, 2023 - ieeexplore.ieee.org
Semiconductor supply chain vulnerability is a major concern in designing trustworthy
systems. Malicious implants, popularly known as hardware Trojans (HTs), can get …

[PDF][PDF] 基于XGBoost 的混合模式门级硬件木马检测方法

张颖, 李森, 陈鑫, 姚嘉祺, 毛志明 - 电子与信息学报, 2021 - jeit.ac.cn
针对恶意的第三方厂商在电路设计阶段中植入硬件木马的问题, 该文提出一种基于XGBoost
的混合模式门级硬件木马检测方法. 该检测方法将电路的每个线网类型作为节点, 采用混合模式3 …

Hybrid multi‐level hardware Trojan detection platform for gate‐level netlists based on XGBoost

Y Zhang, S Li, X Chen, J Yao, Z Mao… - IET Computers & …, 2022 - Wiley Online Library
Coping with the problem of malicious third‐party vendors implanting Hardware Trojan (HT)
in the circuit design stage, this paper proposes a hybrid‐mode gate‐level hardware Trojan …