HOACS: Homomorphic Obfuscation Assisted Concealing of Secrets to Thwart Trojan Attacks in COTS Processor

T Hossain, M Showers, M Hasan, T Hoque - arXiv preprint arXiv …, 2024 - arxiv.org
Commercial-off-the-shelf (COTS) components are often preferred over custom Integrated
Circuits (ICs) to achieve reduced system development time and cost, easy adoption of new …

A neural network framework based on ConvNeXt for side‐channel hardware Trojan detection

Y Gao, J Su, J Li, S Wang, C Li - ETRI Journal, 2024 - Wiley Online Library
Researchers in the field of hardware security have been dedicated to the study of hardware
Trojan detection. Among the various approaches, side‐channel detection methods are …

A Multiobjective Approach for Side-Channel Based Hardware Trojan Detection Using Power Traces

P Mohanraj, S Paramasivam - IEICE Transactions on …, 2024 - search.ieice.org
The detection of hardware trojans has been extensively studied in the past. In this article, we
propose a side-channel analysis technique that uses a wrapper-based feature selection …

Instruction prefetch based power control

M Houston, RK Albright, B Goska, S Ganju… - US Patent …, 2024 - Google Patents
Abstract Systems and methods herein address power for one or more processing units,
using one of a plurality of power profiles during execution of a group of real-time instructions …