Device-specific security challenges and solution in IoT edge computing: a review

A Roy, J Kokila, N Ramasubramanian… - The Journal of …, 2023 - Springer
Rapid growth in IoT technology demands the need for the emergence of new IoT devices.
IoT devices vary in terms of shape, size, storage, battery life, and computational power …

A Side-Channel Hardware Trojan Detection Method Based on Fuzzy C-Means Clustering and Fusion Distance Algorithms

C He, D Lei, H Wu, L Cheng, G Yan… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the wide application of the Internet of Things technology, the hardware security has
attracted more and more attention from users around the world. Hardware Trojan (HT) of …

Review on Hardware Trojan Detection Techniques

R Naveenkumar, NM Sivamangai, A Napolean… - National Academy …, 2023 - Springer
As a result of globalization, chip design and manufacturing are becoming more susceptible
to harmful actions and modifications. However, to develop a reliable and effective system …

Novel methods for locating and matching IC cells based on standard cell libraries

C Liu, K Wang, Q Li, F Zhao, K Zhao, H Ma - Microelectronic Engineering, 2024 - Elsevier
In the domain of hardware assurance, reverse engineering (RE) is essential for ensuring the
security and reliability of integrated circuits (ICs). A potential approach in the crucial step of …

On Modeling and Detecting Trojans in Instruction Sets

Y Zhang, A He, J Li, A Rezine, Z Peng… - … on Computer-Aided …, 2024 - ieeexplore.ieee.org
Amid growing concerns about hardware security, comprehensive security testing has
become essential for chip certification. This paper proposes a deep-testing method for …

Robustness scan of digital circuits using convolutional neural networks

M Vaziri, MM Rahimifar… - 2022 12th International …, 2022 - ieeexplore.ieee.org
Hardware Trojan (HT) is a crucial problem in the integrated circuits and digital systems
industry, which has many malicious impacts on circuits such as overheating, functionality …

A Hardware Trojan-Detection Technique Based on Suspicious Circuit Block Partition

J Mao, X Jiang, D Liu, J Chen, K Huang - Electronics, 2022 - mdpi.com
To ensure that a hardware Trojan remains hidden in a circuit, it is usually necessary to
ensure that the trigger signal has a low testability, which has been widely recognized and …

Implementation of a Finite Impulse Response Filter using PUFs to Avoid Trojans

BN Bukke, K Manjunathachari… - … , Technology & Applied …, 2023 - etasr.com
In the modern era of signal processing, digital filters play an important role in real-time
applications such as communication, consumer electronics, digital signal processing, audio …

A primer on hardware trojans including platform specific attacks and machine learning for detection

GV Cataloni, PS Sawyer, SR Hasan - SoutheastCon 2022, 2022 - ieeexplore.ieee.org
As the semiconductor industry experiences massive growth, the number of parties involved
in the chip design and manufacturing process increases. This leads to untrusted entities …

Hunting for Hardware Trojan in Gate Netlist: A Stacking Ensemble Learning Perspective

L Hong, G Zhu, J Zhou, X Li, Z Chen… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
As hardware designs become more complex and incorporate a wider variety of third-party IP
cores, the risk of hardware Trojan insertion increases. While several techniques have been …