An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

A survey on machine learning against hardware trojan attacks: Recent advances and challenges

Z Huang, Q Wang, Y Chen, X Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
The remarkable success of machine learning (ML) in a variety of research domains has
inspired academic and industrial communities to explore its potential to address hardware …

Ten years of hardware Trojans: a survey from the attacker's perspective

M Xue, C Gu, W Liu, S Yu… - IET Computers & Digital …, 2020 - Wiley Online Library
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …

RAM-Jam: Remote temperature and voltage fault attack on FPGAs using memory collisions

MM Alam, S Tajik, F Ganji… - 2019 Workshop on …, 2019 - ieeexplore.ieee.org
It has been demonstrated that with concrete hardware Trojans, a remote adversary can
mount physical attacks, eg, fault or side-channel attacks, against adjacent IP cores in an …

The hardware trojan war

S Bhunia, M Tehranipoor - Cham,, Switzerland: Springer, 2018 - Springer
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …

Llm for soc security: A paradigm shift

D Saha, S Tarek, K Yahyaei, SK Saha, J Zhou… - arXiv preprint arXiv …, 2023 - arxiv.org
As the ubiquity and complexity of system-on-chip (SoC) designs increase across electronic
devices, the task of incorporating security into an SoC design flow poses significant …

ReTrustFSM: toward RTL hardware obfuscation-a hybrid FSM approach

MS Rahman, R Guo, HM Kamali, F Rahman… - IEEE …, 2023 - ieeexplore.ieee.org
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain
threats, ie, IP piracy and overproduction. Many studies have evaluated numerous …

Fuzz, penetration, and ai testing for soc security verification: Challenges and solutions

KZ Azar, MM Hossain, A Vafaei, H Al Shaikh… - Cryptology ePrint …, 2022 - eprint.iacr.org
The ever-increasing usage and application of system-on-chips (SoCs) has resulted in the
tremendous modernization of these architectures. For a modern SoC design, with the …

Hardware trojan detection using graph neural networks

R Yasaei, L Chen, SY Yu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The globalization of the Integrated Circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third party …

A survey on hardware vulnerability analysis using machine learning

Z Pan, P Mishra - IEEE Access, 2022 - ieeexplore.ieee.org
Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to
support its core functionalities. A typical SoC consists of diverse components gathered from …