Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives

UJ Botero, R Wilson, H Lu, MT Rahman… - ACM Journal on …, 2021 - dl.acm.org
In the context of hardware trust and assurance, reverse engineering has been often
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …

Hardware trojans: Lessons learned after one decade of research

K Xiao, D Forte, Y Jin, R Karri, S Bhunia… - ACM Transactions on …, 2016 - dl.acm.org
Given the increasing complexity of modern electronics and the cost of fabrication, entities
from around the globe have become more heavily involved in all phases of the electronics …

Benchmarking of hardware trojans and maliciously affected circuits

B Shakya, T He, H Salmani, D Forte, S Bhunia… - Journal of Hardware and …, 2017 - Springer
Research in the field of hardware Trojans has seen significant growth in the past decade.
However, standard benchmarks to evaluate hardware Trojans and their detection are …

COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist

H Salmani - IEEE Transactions on Information Forensics and …, 2016 - ieeexplore.ieee.org
This paper presents a novel hardware Trojan detection technique in gate-level netlist based
on the controllability and observability analyses. Using an unsupervised clustering analysis …

Fuzz, penetration, and ai testing for soc security verification: Challenges and solutions

KZ Azar, MM Hossain, A Vafaei, H Al Shaikh… - Cryptology ePrint …, 2022 - eprint.iacr.org
The ever-increasing usage and application of system-on-chips (SoCs) has resulted in the
tremendous modernization of these architectures. For a modern SoC design, with the …

Hardware trojan detection using machine learning: A tutorial

KI Gubbi, B Saber Latibari, A Srikanth… - ACM Transactions on …, 2023 - dl.acm.org
With the growth and globalization of IC design and development, there is an increase in the
number of Designers and Design houses. As setting up a fabrication facility may easily cost …

Hal—the missing piece of the puzzle for hardware reverse engineering, trojan detection and insertion

M Fyrbiak, S Wallat, P Swierczynski… - … on Dependable and …, 2018 - ieeexplore.ieee.org
Hardware manipulations pose a serious threat to numerous systems, ranging from a myriad
of smart-X devices to military systems. In many attack scenarios an adversary merely has …

A comprehensive FPGA reverse engineering tool-chain: From bitstream to RTL code

T Zhang, J Wang, S Guo, Z Chen - IEEE Access, 2019 - ieeexplore.ieee.org
As recently studied, field-programmable gate arrays (FPGAs) suffer from growing Hardware
Trojan (HT) attacks, and many techniques, eg, register-transfer level (RTL) code-based …

Brain-inspired golden chip free hardware trojan detection

S Faezi, R Yasaei, A Barua… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Since 2007, the use of side-channel measurements for detecting Hardware Trojan (HT) has
been extensively studied. However, the majority of works either rely on a golden chip, or …