An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Ten years of hardware Trojans: a survey from the attacker's perspective

M Xue, C Gu, W Liu, S Yu… - IET Computers & Digital …, 2020 - Wiley Online Library
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …

Hardware Trojan attacks: Threat analysis and countermeasures

S Bhunia, MS Hsiao, M Banga… - Proceedings of the …, 2014 - ieeexplore.ieee.org
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …

Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis

J He, Y Zhao, X Guo, Y Jin - IEEE Transactions on Very Large …, 2017 - ieeexplore.ieee.org
The hardware Trojan (HT) has become a major threat for the integrated circuit (IC) industry
and supply chain, and has motivated numerous developments of Trojan detection schemes …

A survey of hardware Trojan threat and defense

H Li, Q Liu, J Zhang - Integration, 2016 - Elsevier
Abstract Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with
various means to steal the internal sensitive data or modify original functionality, which may …

Directed test generation for hardware validation: A survey

A Jayasena, P Mishra - ACM Computing Surveys, 2024 - dl.acm.org
The complexity of hardware designs has increased over the years due to the rapid
advancement of technology coupled with the need to support diverse and complex features …

The hardware trojan war

S Bhunia, M Tehranipoor - Cham,, Switzerland: Springer, 2018 - Springer
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …

Variation tolerant differential 8T SRAM cell for ultralow power applications

S Pal, A Islam - IEEE transactions on computer-aided design of …, 2015 - ieeexplore.ieee.org
Low power and noise tolerant static random access memory (SRAM) cells are in high
demand today. This paper presents a stable differential SRAM cell that consumes low …

Hardware trojan detection using machine learning: A tutorial

KI Gubbi, B Saber Latibari, A Srikanth… - ACM Transactions on …, 2023 - dl.acm.org
With the growth and globalization of IC design and development, there is an increase in the
number of Designers and Design houses. As setting up a fabrication facility may easily cost …

MERS: statistical test generation for side-channel analysis based Trojan detection

Y Huang, S Bhunia, P Mishra - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Hardware Trojan detection has emerged as a critical challenge to ensure security and
trustworthiness of integrated circuits. A vast majority of research efforts in this area has …