Hardware trojans in chips: A survey for detection and prevention

C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen - Sensors, 2020 - mdpi.com
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …

Hardware security for and beyond CMOS technology: an overview on fundamentals, applications, and challenges

J Knechtel - Proceedings of the 2020 International Symposium on …, 2020 - dl.acm.org
As with most aspects of electronic systems and integrated circuits, hardware security has
traditionally evolved around the dominant CMOS technology. However, with the rise of …

Lightweight mitigation of hardware Trojan attacks in NoC-based manycore computing

VY Raparti, S Pasricha - Proceedings of the 56th Annual Design …, 2019 - dl.acm.org
Data-snooping is a serious security threat in NoC fabrics that can lead to theft of sensitive
information from applications executing on manycore processors. Hardware Trojans (HTs) …

Hardware security for and beyond CMOS technology

J Knechtel - Proceedings of the 2021 International Symposium on …, 2021 - dl.acm.org
As with most aspects of electronic systems and integrated circuits, hardware security has
traditionally evolved around the dominant CMOS technology. However, with the rise of …

MacLeR: machine learning-based runtime hardware trojan detection in resource-constrained IoT edge devices

F Khalid, SR Hasan, S Zia, O Hasan… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Traditional learning-based approaches for runtime hardware Trojan (HT) detection require
complex and expensive on-chip data acquisition frameworks, and thus incur high area and …

Survey on recent counterfeit IC detection techniques and future research directions

E Oriero, SR Hasan - Integration, 2019 - Elsevier
In recent years, globalization of the semiconductor supply chain has led to a more complex
production cycle with parts coming from various producers in diverse locations. Outsourcing …

3D integration: Another dimension toward hardware security

J Knechtel, S Patnaik… - 2019 IEEE 25th …, 2019 - ieeexplore.ieee.org
We review threats and selected schemes concerning hardware security at design and
manufacturing time as well as at runtime. We find that 3D integration can serve well to …

Malware attacks: dimensions, impact, and defenses

A Kumar, BJ Choi, KS Kuppusamy, G Aghila - Advances in Nature-Inspired …, 2021 - Springer
Malware is a top threat to the current digital world. It will be more devastating in coming
years due to the expansion of information technology in various fields of life, engagement of …

DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans

E Oriero, F Khalid, H Syed - … of the 12th International Workshop on …, 2023 - dl.acm.org
The global semiconductor supply chain involves design and fabrication at various locations,
which leads to multiple security vulnerabilities, eg, Hardware Trojan (HT) insertion. Although …

SIMCom: Statistical sniffing of inter-module communications for runtime hardware trojan detection

F Khalid, SR Hasan, O Hasan, M Shafique - Microprocessors and …, 2020 - Elsevier
Abstract Timely detection of Hardware Trojans (HTs) has become a major challenge for
secure integrated circuits. We present a run-time methodology for HT detection that employs …