Protection against hardware trojans with logic testing: Proposed solutions and challenges ahead
Protection against Hardware Trojans with Logic Testing: Proposed Solutions and
Challenges Ahead Page 1 2168-2356 (c) 2017 IEEE. Personal use is permitted, but …
Challenges Ahead Page 1 2168-2356 (c) 2017 IEEE. Personal use is permitted, but …
A variational technique for source localization based on a sparse signal reconstruction perspective
M Cetin, DM Malioutov… - 2002 IEEE International …, 2002 - ieeexplore.ieee.org
We propose a novel non-parametric technique for source localization with passive sensor
arrays. Our approach involves formulation of the problem in a variational framework where …
arrays. Our approach involves formulation of the problem in a variational framework where …
Hardware trust through layout filling: A hardware Trojan prevention technique
PS Ba, S Dupuis, M Palanichamy… - 2016 IEEE Computer …, 2016 - ieeexplore.ieee.org
The insertion of malicious alterations to a circuit, referred to as Hardware Trojans, is a threat
considered more and more seriously during the last years. Numerous methods have been …
considered more and more seriously during the last years. Numerous methods have been …
An attribute based classification of hardware trojans
This paper considers the classification of hardware trojans in semiconductor chips. The
phases of the chip production life-cycle are reviewed and opportunities for trojan insertion …
phases of the chip production life-cycle are reviewed and opportunities for trojan insertion …
McSeVIC: A model checking based framework for security vulnerability analysis of integrated circuits
The rising trend of globalization in the integrated circuits' design process has increased their
vulnerabilities against malicious intrusions. The security vulnerability analysis using …
vulnerabilities against malicious intrusions. The security vulnerability analysis using …
Stealthy hardware trojan based algebraic fault analysis of hight block cipher
H Chen, T Wang, F Zhang, X Zhao… - Security and …, 2017 - Wiley Online Library
HIGHT is a lightweight block cipher which has been adopted as a standard block cipher. In
this paper, we present a bit‐level algebraic fault analysis (AFA) of HIGHT, where the faults …
this paper, we present a bit‐level algebraic fault analysis (AFA) of HIGHT, where the faults …
[PDF][PDF] Impact of Cross-standard Cell Libraries on Machine Learning based Hardware Trojan Detection.
SW Chen, JW Liao, CW Tien, JH Hsiao - ICISSP, 2022 - pdfs.semanticscholar.org
Hardware Trojans (HTs) have become a new threat that owns a huge possibility to
widespread into over the world because of its unique characteristic. Hardware Trojan is …
widespread into over the world because of its unique characteristic. Hardware Trojan is …
Duplication-based concurrent detection of hardware Trojans in integrated circuits
Outsourcing the fabrication process to low-cost locations has become a major trend in the
Integrated Circuits (ICs) industry in the last decade. This trend raises the question about …
Integrated Circuits (ICs) industry in the last decade. This trend raises the question about …
Systematic analysis and methodologies for hardware security
S Moein - 2015 - dspace.library.uvic.ca
With the increase in globalization of Integrated Circuit (IC) design and production, hardware
trojans have become a serious threat to manufacturers as well as consumers. These trojans …
trojans have become a serious threat to manufacturers as well as consumers. These trojans …
[PDF][PDF] Duplication-based Concurrent Detection of Hardware Trojans in Integrated Circuits
PSB Manikandan Palanichamy, S Dupuis, ML Flottes… - academia.edu
Outsourcing the fabrication process to low-cost locations has become a major trend in the
Integrated Circuits (ICs) industry in the last decade. This trend raises the question about …
Integrated Circuits (ICs) industry in the last decade. This trend raises the question about …