Ten years of hardware Trojans: a survey from the attacker's perspective
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …
reliable and effective defenses, it is important to figure out how hardware Trojans are …
Hardware trojans in chips: A survey for detection and prevention
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Hardware Trojan attacks: Threat analysis and countermeasures
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …
the information being processed. The underlying hardware used for information processing …
A primer on hardware security: Models, methods, and metrics
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …
Benchmarking of hardware trojans and maliciously affected circuits
Research in the field of hardware Trojans has seen significant growth in the past decade.
However, standard benchmarks to evaluate hardware Trojans and their detection are …
However, standard benchmarks to evaluate hardware Trojans and their detection are …
COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist
H Salmani - IEEE Transactions on Information Forensics and …, 2016 - ieeexplore.ieee.org
This paper presents a novel hardware Trojan detection technique in gate-level netlist based
on the controllability and observability analyses. Using an unsupervised clustering analysis …
on the controllability and observability analyses. Using an unsupervised clustering analysis …
VeriTrust: Verification for hardware trust
Hardware Trojans (HTs) implemented by adversaries serve as backdoors to subvert or
augment the normal operation of infected devices, which may lead to functionality changes …
augment the normal operation of infected devices, which may lead to functionality changes …
Hardware security: Threat models and metrics
M Rostami, F Koushanfar… - 2013 IEEE/ACM …, 2013 - ieeexplore.ieee.org
The globalized semiconductor supply chain is vulnerable to hardware attacks including:
Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs) …
Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs) …
Detecting malicious modifications of data in third-party intellectual property cores
Globalization of the system-on-chip (SoC) design flow has created opportunities for rogue
elements in the intellectual property (IP) vendor companies to insert malicious circuits (aka …
elements in the intellectual property (IP) vendor companies to insert malicious circuits (aka …
Unlocking hardware security assurance: The potential of llms
System-on-Chips (SoCs) form the crux of modern computing systems. SoCs enable high-
level integration through the utilization of multiple Intellectual Property (IP) cores. However …
level integration through the utilization of multiple Intellectual Property (IP) cores. However …