Ten years of hardware Trojans: a survey from the attacker's perspective

M Xue, C Gu, W Liu, S Yu… - IET Computers & Digital …, 2020 - Wiley Online Library
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …

Hardware trojans in chips: A survey for detection and prevention

C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen - Sensors, 2020 - mdpi.com
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …

Hardware Trojan attacks: Threat analysis and countermeasures

S Bhunia, MS Hsiao, M Banga… - Proceedings of the …, 2014 - ieeexplore.ieee.org
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …

A primer on hardware security: Models, methods, and metrics

M Rostami, F Koushanfar, R Karri - Proceedings of the IEEE, 2014 - ieeexplore.ieee.org
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …

Benchmarking of hardware trojans and maliciously affected circuits

B Shakya, T He, H Salmani, D Forte, S Bhunia… - Journal of Hardware and …, 2017 - Springer
Research in the field of hardware Trojans has seen significant growth in the past decade.
However, standard benchmarks to evaluate hardware Trojans and their detection are …

COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist

H Salmani - IEEE Transactions on Information Forensics and …, 2016 - ieeexplore.ieee.org
This paper presents a novel hardware Trojan detection technique in gate-level netlist based
on the controllability and observability analyses. Using an unsupervised clustering analysis …

VeriTrust: Verification for hardware trust

J Zhang, F Yuan, L Wei, Z Sun, Q Xu - Proceedings of the 50th Annual …, 2013 - dl.acm.org
Hardware Trojans (HTs) implemented by adversaries serve as backdoors to subvert or
augment the normal operation of infected devices, which may lead to functionality changes …

Hardware security: Threat models and metrics

M Rostami, F Koushanfar… - 2013 IEEE/ACM …, 2013 - ieeexplore.ieee.org
The globalized semiconductor supply chain is vulnerable to hardware attacks including:
Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs) …

Detecting malicious modifications of data in third-party intellectual property cores

J Rajendran, V Vedula, R Karri - … of the 52nd Annual Design Automation …, 2015 - dl.acm.org
Globalization of the system-on-chip (SoC) design flow has created opportunities for rogue
elements in the intellectual property (IP) vendor companies to insert malicious circuits (aka …

Unlocking hardware security assurance: The potential of llms

X Meng, A Srivastava, A Arunachalam, A Ray… - arXiv preprint arXiv …, 2023 - arxiv.org
System-on-Chips (SoCs) form the crux of modern computing systems. SoCs enable high-
level integration through the utilization of multiple Intellectual Property (IP) cores. However …