MacLeR: machine learning-based runtime hardware trojan detection in resource-constrained IoT edge devices

F Khalid, SR Hasan, S Zia, O Hasan… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Traditional learning-based approaches for runtime hardware Trojan (HT) detection require
complex and expensive on-chip data acquisition frameworks, and thus incur high area and …

Overview of security for smart cyber-physical systems

F Khalid, S Rehman, M Shafique - Security of Cyber-Physical Systems …, 2020 - Springer
The tremendous growth of interconnectivity and dependencies of physical and cyber
domains in cyber-physical systems (CPS) makes them vulnerable to several security threats …

Runtime hardware Trojan monitors through modeling burst mode communication using formal verification

F Khalid, SR Hasan, O Hasan, F Awwad - Integration, 2018 - Elsevier
Globalization trends in integrated circuit (IC) design using deep sub-micron (DSM)
technologies are leading to increased vulnerability against malicious intrusions. Various …

Runtime hardware Trojan detection by reconfigurable monitoring circuits

R Fani, M Saheb Zamani - The Journal of Supercomputing, 2022 - Springer
The trustability of integrated circuits (ICs) has become a serious issue due to the outsourcing
of IC manufacturing to third-party foundries. Given reports of IC tampering, extensive …

DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans

E Oriero, F Khalid, H Syed - … of the 12th International Workshop on …, 2023 - dl.acm.org
The global semiconductor supply chain involves design and fabrication at various locations,
which leads to multiple security vulnerabilities, eg, Hardware Trojan (HT) insertion. Although …

[PDF][PDF] ATrusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration.

N Shekofte, S Bayat-Sarmadi, H Mosanaei-Boorani - ISeCure, 2021 - sid.ir
Hardware Trojans have emerged as a major concern for integrated circuits in recent years.
As a result, detecting Trojans has become an important issue in critical applications, such as …

System and method for intrusion detection on a physical level using an internal analog to digital converter

S Gehrer, JG Merchan, S Jain - US Patent App. 17/032,624, 2022 - Google Patents
(57) ABSTRACT A system that includes memory and a microcontroller including an analog-
to-digital converter (ADC) and in com munication with the memory. The microcontroller is …

Hardware Trojan Detection in Sequential Logic Designs

PH Dharmadhikari - 2018 - rave.ohiolink.edu
Modern digital era empowers the resurgence of the Internet of Things (IoT) concept
proposed back in the 1980s. IoT applications involve a network of embedded systems that …

[引用][C] Online Hardware Trojan Detection on SoC Integration Level: Leveraging Machine Learning

S Zia, O Hassan - 2018 - NUST School of Electrical …