An overview of hardware security and trust: Threats, countermeasures, and design tools
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
Ten years of hardware Trojans: a survey from the attacker's perspective
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …
reliable and effective defenses, it is important to figure out how hardware Trojans are …
Hardware Trojan attacks: Threat analysis and countermeasures
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …
the information being processed. The underlying hardware used for information processing …
Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis
The hardware Trojan (HT) has become a major threat for the integrated circuit (IC) industry
and supply chain, and has motivated numerous developments of Trojan detection schemes …
and supply chain, and has motivated numerous developments of Trojan detection schemes …
A survey of hardware Trojan threat and defense
Abstract Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with
various means to steal the internal sensitive data or modify original functionality, which may …
various means to steal the internal sensitive data or modify original functionality, which may …
Directed test generation for hardware validation: A survey
A Jayasena, P Mishra - ACM Computing Surveys, 2024 - dl.acm.org
The complexity of hardware designs has increased over the years due to the rapid
advancement of technology coupled with the need to support diverse and complex features …
advancement of technology coupled with the need to support diverse and complex features …
The hardware trojan war
S Bhunia, M Tehranipoor - Cham,, Switzerland: Springer, 2018 - Springer
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …
the information being processed. The underlying hardware used for information processing …
Variation tolerant differential 8T SRAM cell for ultralow power applications
Low power and noise tolerant static random access memory (SRAM) cells are in high
demand today. This paper presents a stable differential SRAM cell that consumes low …
demand today. This paper presents a stable differential SRAM cell that consumes low …
Hardware trojan detection using machine learning: A tutorial
With the growth and globalization of IC design and development, there is an increase in the
number of Designers and Design houses. As setting up a fabrication facility may easily cost …
number of Designers and Design houses. As setting up a fabrication facility may easily cost …
MERS: statistical test generation for side-channel analysis based Trojan detection
Hardware Trojan detection has emerged as a critical challenge to ensure security and
trustworthiness of integrated circuits. A vast majority of research efforts in this area has …
trustworthiness of integrated circuits. A vast majority of research efforts in this area has …