Design of hardware trojans and its impact on cps systems: A comprehensive survey

A Dhavlle, R Hassan, M Mittapalli… - … on Circuits and …, 2021 - ieeexplore.ieee.org
The ever-increasing demand for sophisticated cyber-physical systems (CPS), combined with
the fabless model, led to vulnerability exploits in the IC supply chain, especially the insertion …

Survey of hardware trojan threats and detection

Y Hayashi, S Kawamura - 2020 International Symposium on …, 2020 - ieeexplore.ieee.org
Functions that are not intended by the chip designer are added in the IC manufacturing
supply chain, which may cause the destruction of the IC or degrade security under certain …

Study of hardware trojans based security vulnerabilities in cyber physical systems

K Lingasubramanian, R Kumar… - 2018 IEEE …, 2018 - ieeexplore.ieee.org
The dependability of Cyber Physical Systems (CPS) solely lies in the secure and reliable
functionality of their backbone, the computing platform. Security of this platform is not only …

Hardware trojans in chips: A survey for detection and prevention

C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen - Sensors, 2020 - mdpi.com
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …

Introduction to hardware trojans

J Vosatka - The Hardware Trojan War: Attacks, Myths, and …, 2018 - Springer
Hardware Trojans are a major concern to the overall security and trust of any electronic
system. These malicious modifications of circuits are designed to wreak havoc by altering …

Deep learning based approach for hardware trojan detection

S Sankaran, VS Mohan… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Hardware Trojans are modifications made by malicious insiders or third party providers
during the design or fabrication phase of the IC (Integrated Circuits) design cycle in a covert …

Malicious routing: Circumventing bitstream-level verification for FPGAs

QA Ahmed, T Wiersema… - 2021 Design, Automation …, 2021 - ieeexplore.ieee.org
The battle of developing hardware Trojans and corresponding countermeasures has taken
adversaries towards ingenious ways of compromising hardware designs by circumventing …

A survey on recent detection methods of the hardware trojans

R Naveenkumar, NM Sivamangai… - 2021 3rd …, 2021 - ieeexplore.ieee.org
Modern integrated circuit design contains various constraints from the frontend to the
backend. In microelectronic systems hardware security is a major threat. Hardware Trojan …

A design methodology for stealthy parametric trojans and its application to bug attacks

S Ghandali, GT Becker, D Holcomb, C Paar - Cryptographic Hardware and …, 2016 - Springer
Over the last decade, hardware Trojans have gained increasing attention in academia,
industry and by government agencies. In order to design reliable countermeasures, it is …

Red team vs. blue team: a real-world hardware Trojan detection case study across four modern CMOS technology generations

E Puschner, T Moos, S Becker, C Kison… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Verifying the absence of maliciously inserted Trojans in Integrated Circuits (ICs) is a crucial
task–especially for security-enabled products. Depending on the concrete threat model …