DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans

E Oriero, F Khalid, H Syed - … of the 12th International Workshop on …, 2023 - dl.acm.org
The global semiconductor supply chain involves design and fabrication at various locations,
which leads to multiple security vulnerabilities, eg, Hardware Trojan (HT) insertion. Although …

Logic Locking based Trojans: A Friend Turns Foe

Y Liu, A Jayasena, P Mishra, A Srivastava - arXiv preprint arXiv …, 2023 - arxiv.org
Logic locking and hardware Trojans are two fields in hardware security that have been
mostly developed independently from each other. In this paper, we identify the relationship …

[PDF][PDF] 2023ECOSYSTEM FOR TRUSTWORTHY IT

D Sisejkovic, LM Reimann, M Malenko, R Leupers - 2023 - cyberagentur.de
The contemporary Integrated Circuit (IC) supply chain follows a horizontal business model in
which Intellectual Property (IP) owners rely on the involvement of external design houses …