Hardware trojans in chips: A survey for detection and prevention
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Hardware security for and beyond CMOS technology: an overview on fundamentals, applications, and challenges
J Knechtel - Proceedings of the 2020 International Symposium on …, 2020 - dl.acm.org
As with most aspects of electronic systems and integrated circuits, hardware security has
traditionally evolved around the dominant CMOS technology. However, with the rise of …
traditionally evolved around the dominant CMOS technology. However, with the rise of …
Lightweight mitigation of hardware Trojan attacks in NoC-based manycore computing
VY Raparti, S Pasricha - Proceedings of the 56th Annual Design …, 2019 - dl.acm.org
Data-snooping is a serious security threat in NoC fabrics that can lead to theft of sensitive
information from applications executing on manycore processors. Hardware Trojans (HTs) …
information from applications executing on manycore processors. Hardware Trojans (HTs) …
Hardware security for and beyond CMOS technology
J Knechtel - Proceedings of the 2021 International Symposium on …, 2021 - dl.acm.org
As with most aspects of electronic systems and integrated circuits, hardware security has
traditionally evolved around the dominant CMOS technology. However, with the rise of …
traditionally evolved around the dominant CMOS technology. However, with the rise of …
MacLeR: machine learning-based runtime hardware trojan detection in resource-constrained IoT edge devices
Traditional learning-based approaches for runtime hardware Trojan (HT) detection require
complex and expensive on-chip data acquisition frameworks, and thus incur high area and …
complex and expensive on-chip data acquisition frameworks, and thus incur high area and …
Survey on recent counterfeit IC detection techniques and future research directions
In recent years, globalization of the semiconductor supply chain has led to a more complex
production cycle with parts coming from various producers in diverse locations. Outsourcing …
production cycle with parts coming from various producers in diverse locations. Outsourcing …
3D integration: Another dimension toward hardware security
J Knechtel, S Patnaik… - 2019 IEEE 25th …, 2019 - ieeexplore.ieee.org
We review threats and selected schemes concerning hardware security at design and
manufacturing time as well as at runtime. We find that 3D integration can serve well to …
manufacturing time as well as at runtime. We find that 3D integration can serve well to …
Malware attacks: dimensions, impact, and defenses
Malware is a top threat to the current digital world. It will be more devastating in coming
years due to the expansion of information technology in various fields of life, engagement of …
years due to the expansion of information technology in various fields of life, engagement of …
DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans
The global semiconductor supply chain involves design and fabrication at various locations,
which leads to multiple security vulnerabilities, eg, Hardware Trojan (HT) insertion. Although …
which leads to multiple security vulnerabilities, eg, Hardware Trojan (HT) insertion. Although …
SIMCom: Statistical sniffing of inter-module communications for runtime hardware trojan detection
Abstract Timely detection of Hardware Trojans (HTs) has become a major challenge for
secure integrated circuits. We present a run-time methodology for HT detection that employs …
secure integrated circuits. We present a run-time methodology for HT detection that employs …