Hardware trojans in chips: A survey for detection and prevention

C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen - Sensors, 2020 - mdpi.com
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …

Beyond cache attacks: Exploiting the bus-based communication structure for powerful on-chip microarchitectural attacks

J Sepúlveda, M Gross, A Zankl, G Sigl - ACM Transactions on Embedded …, 2021 - dl.acm.org
System-on-Chips (SoCs) are a key enabling technology for the Internet-of-Things (IoT), a
hyper-connected world where on-and inter-chip communication is ubiquitous. SoCs usually …

Virtual platform to analyze the security of a system on chip at microarchitectural level

Q Forcioli, JL Danger, C Maurice… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
The processors (CPUs) embedded in System on Chip (SoC) have to face recent attacks
taking advantage of vulnerabilities/features in their microarchitectures to retrieve secret …

Coherence Attacks and Countermeasures in Interposer-based Chiplet Systems

GA Chacon, C Williams, J Knechtel… - ACM Transactions on …, 2024 - dl.acm.org
Industry is moving towards large-scale hardware systems that bundle processor cores,
memories, accelerators, and so on. via 2.5 D integration. These components are fabricated …

Hardware trojan threats to cache coherence in modern 2.5 D chiplet systems

GA Chacon, C Williams, J Knechtel… - IEEE Computer …, 2022 - ieeexplore.ieee.org
As industry moves toward chiplet-based designs, the insertion of hardware Trojans poses a
significant threat to the security of these systems. These systems rely heavily on cache …

Design, threat analysis and countermeasures for cache replacement policy-affecting Hardware Trojans in the context of a many-core system

S Hazra, B Avinash, M Dalui - Microelectronics Journal, 2023 - Elsevier
Hardware Trojans, which threaten system reliability and integrity, have emerged as a
security threat to the IC industry. Hardware manufacturers acquire ICs from unreliable third …

Lightweight Multicast Authentication in NoC-based SoCs

H Weerasena, P Mishra - 2024 25th International Symposium …, 2024 - ieeexplore.ieee.org
Network-on-Chip (NoC) is responsible for managing communication in modern SoCs. The
ubiquity of NoC and its distributed nature across the chip has made it a focal point of attacks …

Evaluation and detection of hardware Trojan for real-time many-core systems

S Hazra, JS Sattenapalli, A Roy… - 2018 8th International …, 2018 - ieeexplore.ieee.org
Due to the growing complexities of Integrated Circuits (ICs) and the current trend of
Intellectual Property (IP) based hardware designs, the possible threats of Hardware Trojans …

Caching efficiency enhancement at wireless edges with concerns on user's quality of experience

F Li, KY Lam, L Wang, Z Na, X Liu… - … and Mobile Computing, 2018 - Wiley Online Library
Content caching is a promising approach to enhancing bandwidth utilization and minimizing
delivery delay for new‐generation Internet applications. The design of content caching is …

Performing cache timing attacks from the reconfigurable part of a heterogeneous SoC—An experimental study

L Bossuet, EM Benhani - Applied Sciences, 2021 - mdpi.com
Cache attacks are widespread on microprocessors and multi-processor system-on-chips but
have not yet spread to heterogeneous systems-on-chip such as SoC-FPGA that are found in …