MacLeR: machine learning-based runtime hardware trojan detection in resource-constrained IoT edge devices
Traditional learning-based approaches for runtime hardware Trojan (HT) detection require
complex and expensive on-chip data acquisition frameworks, and thus incur high area and …
complex and expensive on-chip data acquisition frameworks, and thus incur high area and …
Overview of security for smart cyber-physical systems
The tremendous growth of interconnectivity and dependencies of physical and cyber
domains in cyber-physical systems (CPS) makes them vulnerable to several security threats …
domains in cyber-physical systems (CPS) makes them vulnerable to several security threats …
Runtime hardware Trojan monitors through modeling burst mode communication using formal verification
Globalization trends in integrated circuit (IC) design using deep sub-micron (DSM)
technologies are leading to increased vulnerability against malicious intrusions. Various …
technologies are leading to increased vulnerability against malicious intrusions. Various …
Runtime hardware Trojan detection by reconfigurable monitoring circuits
R Fani, M Saheb Zamani - The Journal of Supercomputing, 2022 - Springer
The trustability of integrated circuits (ICs) has become a serious issue due to the outsourcing
of IC manufacturing to third-party foundries. Given reports of IC tampering, extensive …
of IC manufacturing to third-party foundries. Given reports of IC tampering, extensive …
DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans
The global semiconductor supply chain involves design and fabrication at various locations,
which leads to multiple security vulnerabilities, eg, Hardware Trojan (HT) insertion. Although …
which leads to multiple security vulnerabilities, eg, Hardware Trojan (HT) insertion. Although …
[PDF][PDF] ATrusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration.
N Shekofte, S Bayat-Sarmadi, H Mosanaei-Boorani - ISeCure, 2021 - sid.ir
Hardware Trojans have emerged as a major concern for integrated circuits in recent years.
As a result, detecting Trojans has become an important issue in critical applications, such as …
As a result, detecting Trojans has become an important issue in critical applications, such as …
System and method for intrusion detection on a physical level using an internal analog to digital converter
(57) ABSTRACT A system that includes memory and a microcontroller including an analog-
to-digital converter (ADC) and in com munication with the memory. The microcontroller is …
to-digital converter (ADC) and in com munication with the memory. The microcontroller is …
Hardware Trojan Detection in Sequential Logic Designs
PH Dharmadhikari - 2018 - rave.ohiolink.edu
Modern digital era empowers the resurgence of the Internet of Things (IoT) concept
proposed back in the 1980s. IoT applications involve a network of embedded systems that …
proposed back in the 1980s. IoT applications involve a network of embedded systems that …
[引用][C] Online Hardware Trojan Detection on SoC Integration Level: Leveraging Machine Learning
S Zia, O Hassan - 2018 - NUST School of Electrical …