Protection against hardware trojans with logic testing: Proposed solutions and challenges ahead

S Dupuis, ML Flottes, G Di Natale… - IEEE Design & …, 2017 - ieeexplore.ieee.org
Protection against Hardware Trojans with Logic Testing: Proposed Solutions and
Challenges Ahead Page 1 2168-2356 (c) 2017 IEEE. Personal use is permitted, but …

A variational technique for source localization based on a sparse signal reconstruction perspective

M Cetin, DM Malioutov… - 2002 IEEE International …, 2002 - ieeexplore.ieee.org
We propose a novel non-parametric technique for source localization with passive sensor
arrays. Our approach involves formulation of the problem in a variational framework where …

Hardware trust through layout filling: A hardware Trojan prevention technique

PS Ba, S Dupuis, M Palanichamy… - 2016 IEEE Computer …, 2016 - ieeexplore.ieee.org
The insertion of malicious alterations to a circuit, referred to as Hardware Trojans, is a threat
considered more and more seriously during the last years. Numerous methods have been …

An attribute based classification of hardware trojans

S Moein, S Khan, TA Gulliver, F Gebali… - … & Systems (ICCES), 2015 - ieeexplore.ieee.org
This paper considers the classification of hardware trojans in semiconductor chips. The
phases of the chip production life-cycle are reviewed and opportunities for trojan insertion …

McSeVIC: A model checking based framework for security vulnerability analysis of integrated circuits

IH Abbassi, F Khalid, O Hasan, AM Kamboh… - IEEE …, 2018 - ieeexplore.ieee.org
The rising trend of globalization in the integrated circuits' design process has increased their
vulnerabilities against malicious intrusions. The security vulnerability analysis using …

Stealthy hardware trojan based algebraic fault analysis of hight block cipher

H Chen, T Wang, F Zhang, X Zhao… - Security and …, 2017 - Wiley Online Library
HIGHT is a lightweight block cipher which has been adopted as a standard block cipher. In
this paper, we present a bit‐level algebraic fault analysis (AFA) of HIGHT, where the faults …

[PDF][PDF] Impact of Cross-standard Cell Libraries on Machine Learning based Hardware Trojan Detection.

SW Chen, JW Liao, CW Tien, JH Hsiao - ICISSP, 2022 - pdfs.semanticscholar.org
Hardware Trojans (HTs) have become a new threat that owns a huge possibility to
widespread into over the world because of its unique characteristic. Hardware Trojan is …

Duplication-based concurrent detection of hardware Trojans in integrated circuits

M Palanichamy, PS Ba, S Dupuis, ML Flottes… - TRUDEVICE, 2016 - hal.science
Outsourcing the fabrication process to low-cost locations has become a major trend in the
Integrated Circuits (ICs) industry in the last decade. This trend raises the question about …

Systematic analysis and methodologies for hardware security

S Moein - 2015 - dspace.library.uvic.ca
With the increase in globalization of Integrated Circuit (IC) design and production, hardware
trojans have become a serious threat to manufacturers as well as consumers. These trojans …

[PDF][PDF] Duplication-based Concurrent Detection of Hardware Trojans in Integrated Circuits

PSB Manikandan Palanichamy, S Dupuis, ML Flottes… - academia.edu
Outsourcing the fabrication process to low-cost locations has become a major trend in the
Integrated Circuits (ICs) industry in the last decade. This trend raises the question about …