Survey of recent developments for hardware trojan detection
The outsourcing of the design and manufacturing of Integrated Circuits (ICs) poses a severe
threat to our critical infrastructures as an adversary can exploit them by bypassing the …
threat to our critical infrastructures as an adversary can exploit them by bypassing the …
TAAL: Tampering attack on any key-based logic locked circuits
Due to the globalization of semiconductor manufacturing and test processes, the system-on-
a-chip (SoC) designers no longer design the complete SoC and manufacture chips on their …
a-chip (SoC) designers no longer design the complete SoC and manufacture chips on their …
Security closure of physical layouts ICCAD special session paper
Computer-aided design (CAD) tools traditionally optimize for power, performance, and area
(PPA). However, given a vast number of hardware security threats, we call for secure-by …
(PPA). However, given a vast number of hardware security threats, we call for secure-by …
Leaking wireless ICs via hardware trojan-infected synchronization
AR Díaz-Rizo, H Aboushady… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We propose a Hardware Trojan (HT) attack in wireless Integrated Circuits (ICs) that aims at
leaking sensitive information within a legitimate transmission. The HT is hidden inside the …
leaking sensitive information within a legitimate transmission. The HT is hidden inside the …
A survey and perspective on artificial intelligence for security-aware electronic design automation
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly
used in several fields to improve performance and the level of automation. In recent years …
used in several fields to improve performance and the level of automation. In recent years …
Let's Get Cyber-Physical: Validation of Safety-Critical Cyber-Physical Systems
L Novais, N Naia, J Azevedo, J Cabral - IEEE Access, 2024 - ieeexplore.ieee.org
Advancements in technology are propelling Cyber-Physical Systems (CPS) into crucial roles
across various sectors, implying the need for stricter CPS safety and security measures as …
across various sectors, implying the need for stricter CPS safety and security measures as …
Trusted and secure design of analog/RF ICs: Recent developments
K Subramani, G Volanis, MM Bidmeshki… - 2019 IEEE 25th …, 2019 - ieeexplore.ieee.org
Unlike the extensive research effort that has been expended over the last 15 years in
understanding the threats of hardware Trojans, piracy and counterfeiting of digital Integrated …
understanding the threats of hardware Trojans, piracy and counterfeiting of digital Integrated …
DEFending integrated circuit layouts
J Bhandari, J Gopinath, M Ashraf… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Modern integrated circuits (ICs) require a complex, outsourced supply-chain, involving
computer-aided design (CAD) tools, expert knowledge, and advanced foundries. This …
computer-aided design (CAD) tools, expert knowledge, and advanced foundries. This …
Proof-carrying hardware-based information flow tracking in analog/mixed-signal designs
MM Bidmeshki, A Antonopoulos… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
Information flow tracking (IFT) is a widely used methodology for ensuring data confidentiality
and/or integrity in electronic systems and many such methods have been developed at …
and/or integrity in electronic systems and many such methods have been developed at …
FPGAPRO: A defense framework against crosstalk-induced secret leakage in FPGA
With the emerging cloud-computing development, FPGAs are being integrated with cloud
servers for higher performance. Recently, it has been explored to enable multiple users to …
servers for higher performance. Recently, it has been explored to enable multiple users to …