An overview of hardware security and trust: Threats, countermeasures, and design tools
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
A survey on machine learning against hardware trojan attacks: Recent advances and challenges
Z Huang, Q Wang, Y Chen, X Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
The remarkable success of machine learning (ML) in a variety of research domains has
inspired academic and industrial communities to explore its potential to address hardware …
inspired academic and industrial communities to explore its potential to address hardware …
Ten years of hardware Trojans: a survey from the attacker's perspective
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …
reliable and effective defenses, it is important to figure out how hardware Trojans are …
RAM-Jam: Remote temperature and voltage fault attack on FPGAs using memory collisions
It has been demonstrated that with concrete hardware Trojans, a remote adversary can
mount physical attacks, eg, fault or side-channel attacks, against adjacent IP cores in an …
mount physical attacks, eg, fault or side-channel attacks, against adjacent IP cores in an …
The hardware trojan war
S Bhunia, M Tehranipoor - Cham,, Switzerland: Springer, 2018 - Springer
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …
the information being processed. The underlying hardware used for information processing …
Llm for soc security: A paradigm shift
As the ubiquity and complexity of system-on-chip (SoC) designs increase across electronic
devices, the task of incorporating security into an SoC design flow poses significant …
devices, the task of incorporating security into an SoC design flow poses significant …
ReTrustFSM: toward RTL hardware obfuscation-a hybrid FSM approach
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain
threats, ie, IP piracy and overproduction. Many studies have evaluated numerous …
threats, ie, IP piracy and overproduction. Many studies have evaluated numerous …
Fuzz, penetration, and ai testing for soc security verification: Challenges and solutions
The ever-increasing usage and application of system-on-chips (SoCs) has resulted in the
tremendous modernization of these architectures. For a modern SoC design, with the …
tremendous modernization of these architectures. For a modern SoC design, with the …
Hardware trojan detection using graph neural networks
The globalization of the Integrated Circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third party …
fabrication, and testing process from a single trusted entity to various untrusted third party …
A survey on hardware vulnerability analysis using machine learning
Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to
support its core functionalities. A typical SoC consists of diverse components gathered from …
support its core functionalities. A typical SoC consists of diverse components gathered from …