Hardware information flow tracking
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …
understand how information moves through a computing system. Hardware IFT techniques …
Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives
In the context of hardware trust and assurance, reverse engineering has been often
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …
Hardware trojans: Lessons learned after one decade of research
Given the increasing complexity of modern electronics and the cost of fabrication, entities
from around the globe have become more heavily involved in all phases of the electronics …
from around the globe have become more heavily involved in all phases of the electronics …
Benchmarking of hardware trojans and maliciously affected circuits
Research in the field of hardware Trojans has seen significant growth in the past decade.
However, standard benchmarks to evaluate hardware Trojans and their detection are …
However, standard benchmarks to evaluate hardware Trojans and their detection are …
COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist
H Salmani - IEEE Transactions on Information Forensics and …, 2016 - ieeexplore.ieee.org
This paper presents a novel hardware Trojan detection technique in gate-level netlist based
on the controllability and observability analyses. Using an unsupervised clustering analysis …
on the controllability and observability analyses. Using an unsupervised clustering analysis …
Fuzz, penetration, and ai testing for soc security verification: Challenges and solutions
The ever-increasing usage and application of system-on-chips (SoCs) has resulted in the
tremendous modernization of these architectures. For a modern SoC design, with the …
tremendous modernization of these architectures. For a modern SoC design, with the …
Hardware trojan detection using machine learning: A tutorial
With the growth and globalization of IC design and development, there is an increase in the
number of Designers and Design houses. As setting up a fabrication facility may easily cost …
number of Designers and Design houses. As setting up a fabrication facility may easily cost …
Hal—the missing piece of the puzzle for hardware reverse engineering, trojan detection and insertion
M Fyrbiak, S Wallat, P Swierczynski… - … on Dependable and …, 2018 - ieeexplore.ieee.org
Hardware manipulations pose a serious threat to numerous systems, ranging from a myriad
of smart-X devices to military systems. In many attack scenarios an adversary merely has …
of smart-X devices to military systems. In many attack scenarios an adversary merely has …
A comprehensive FPGA reverse engineering tool-chain: From bitstream to RTL code
As recently studied, field-programmable gate arrays (FPGAs) suffer from growing Hardware
Trojan (HT) attacks, and many techniques, eg, register-transfer level (RTL) code-based …
Trojan (HT) attacks, and many techniques, eg, register-transfer level (RTL) code-based …
Brain-inspired golden chip free hardware trojan detection
Since 2007, the use of side-channel measurements for detecting Hardware Trojan (HT) has
been extensively studied. However, the majority of works either rely on a golden chip, or …
been extensively studied. However, the majority of works either rely on a golden chip, or …