A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention

R Mukherjee, SR Rajendran… - Journal of Cryptographic …, 2022 - Springer
Hardware Trojans have emerged as a great threat to the trustability of modern electronic
systems. A deployed electronic system with one or more undetected Hardware Trojan …

Sok: Physical and logic testing techniques for hardware trojan detection

SR Rajendran, R Mukherjee… - Proceedings of the 4th …, 2020 - dl.acm.org
Hardware Trojans have emerged as great threat to the trustability of modern electronic
systems. A deployed electronic system with one or more undetected Hardware Trojan …

Detection of malicious circuitry using transition probability based node reduction technique

IS Jacob, M Jayakumar - … Computing Electronics and …, 2018 - telkomnika.uad.ac.id
In recent years, serious concerns have been raised against the tampering of integrated
circuits due to outsourcing of circuits for fabrication. It has led to the addition of malicious …

Security challenges in hardware used for smart environments

SR Rajendran - Internet of Things and Secure Smart …, 2020 - taylorfrancis.com
Internet of Things (IoT) is a most emerging technology in which Internet connects everything
from anywhere at all times using Internet Protocol (IP). However, the smart environment or …

Detection of malicious circuit in hardware using compressive sensing algorithm

M Priyatharishini, MN Devi - 2018 Second international …, 2018 - ieeexplore.ieee.org
It has been observed very critically in the hardware that robust Trojans are inserted in
outsourced products resulting in security vulnerabilities. It is more important to note that …

Efficient Hardware Trojan Detection Using Generic Feature Extraction and Weighted Ensemble Method

V Sankar, M Nirmala Devi - Advanced Computing and Intelligent …, 2022 - Springer
Usage of smart devices has tremendously grown with the advent of Internet of Things (IoT).
Like software, Integrated Circuit (IC) being the core component of hardware is also highly un …

Realization of Re-configurable True Random Number Generator on FPGA

M Priyatharishini, M Nirmala Devi - International Symposium on Security in …, 2019 - Springer
True random number generation (TRNG) is one of the prominent research areas in present
scenario of cryptography and security. It has been reported in the recent past that even …

[PDF][PDF] Detection of Malicious Circuitry Using Transition Probability Based Node Reduction Technique

M Nirmala Devi, IS Jacob, R Sree Ranjani… - 2018 - academia.edu
In recent years, serious concerns have been raised against the tampering of integrated
circuits due to outsourcing of circuits for fabrication. It has led to the addition of malicious …