[HTML][HTML] Hardware trojans in chips: A survey for detection and prevention

C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen - Sensors, 2020 - mdpi.com
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …

Conventional and machine learning approaches as countermeasures against hardware trojan attacks

KG Liakos, GK Georgakilas, S Moustakidis… - Microprocessors and …, 2020 - Elsevier
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …

Evaluation approach for efficient countermeasure techniques against denial-of-service attack on MPSoC-based IoT using multi-criteria decision-making

AAJ Al-Hchaimi, NB Sulaiman, MAB Mustafa… - IEEE …, 2022 - ieeexplore.ieee.org
Context: Denial-of-Service Attack countermeasure techniques (DoS A-CTs) evaluation is a
Multi-criteria decision-making (MCDM) problem based on different MPSoCs of IoT platform …

On malicious implants in PCBs throughout the supply chain

J Harrison, N Asadizanjani, M Tehranipoor - Integration, 2021 - Elsevier
The PCB supply chain has become globally distributed such that PCBs are vulnerable to
hardware Trojan attacks. Moreover, attacks on PCBs are possible even after a system is …

Special session: Towards an agile design methodology for efficient, reliable, and secure ML systems

S Dave, A Marchisio, MA Hanif… - 2022 IEEE 40th VLSI …, 2022 - ieeexplore.ieee.org
The real-world use cases of Machine Learning (ML) have exploded over the past few years.
However, the current computing infrastructure is insufficient to support all real-world …

Hardware trojan detection using changepoint-based anomaly detection techniques

R Elnaggar, K Chakrabarty… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
There has been a growing trend in recent years to outsource various aspects of the
semiconductor design and manufacturing flow to different parties spread across the globe …

MacLeR: machine learning-based runtime hardware trojan detection in resource-constrained IoT edge devices

F Khalid, SR Hasan, S Zia, O Hasan… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Traditional learning-based approaches for runtime hardware Trojan (HT) detection require
complex and expensive on-chip data acquisition frameworks, and thus incur high area and …

Overview of security for smart cyber-physical systems

F Khalid, S Rehman, M Shafique - Security of Cyber-Physical Systems …, 2020 - Springer
The tremendous growth of interconnectivity and dependencies of physical and cyber
domains in cyber-physical systems (CPS) makes them vulnerable to several security threats …

Heterogenous ensemble learning driven multi-parametric assessment model for hardware Trojan detection

T Lavanya, K Rajalakshmi - Integration, 2023 - Elsevier
Semiconductor technologies have gained wide-spread attention across industries due to its
use in varied digital signal processing units, healthcare-devices, industrial communication …

Formal  Model and Analysis for the Random Event in the Intelligent Car with Stochastic Petri Nets and Z

Y Liu, Y Fan, D Huang, B Mi… - Security and …, 2022 - Wiley Online Library
With the continuous development of science and technology, people's lifestyle becomes
more and more intelligent, especially in intelligent transportation. However, running in a …