Ten years of hardware Trojans: a survey from the attacker's perspective

M Xue, C Gu, W Liu, S Yu… - IET Computers & Digital …, 2020 - Wiley Online Library
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …

Hardware Trojan attacks: Threat analysis and countermeasures

S Bhunia, MS Hsiao, M Banga… - Proceedings of the …, 2014 - ieeexplore.ieee.org
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …

Benchmarking of hardware trojans and maliciously affected circuits

B Shakya, T He, H Salmani, D Forte, S Bhunia… - Journal of Hardware and …, 2017 - Springer
Research in the field of hardware Trojans has seen significant growth in the past decade.
However, standard benchmarks to evaluate hardware Trojans and their detection are …

Introduction to hardware security

Y Jin - Electronics, 2015 - mdpi.com
Hardware security has become a hot topic recently with more and more researchers from
related research domains joining this area. However, the understanding of hardware …

COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist

H Salmani - IEEE Transactions on Information Forensics and …, 2016 - ieeexplore.ieee.org
This paper presents a novel hardware Trojan detection technique in gate-level netlist based
on the controllability and observability analyses. Using an unsupervised clustering analysis …

Case study: Detecting hardware Trojans in third-party digital IP cores

X Zhang, M Tehranipoor - 2011 IEEE International Symposium …, 2011 - ieeexplore.ieee.org
The intellectual property (IP) blocks are designed by hundreds of IP vendors distributed
across the world. Such IPs cannot be assumed trusted as hardware Trojans can be …

Proof-carrying hardware intellectual property: A pathway to trusted module acquisition

E Love, Y Jin, Y Makris - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
We present a novel framework for facilitating the acquisition of provably trustworthy
hardware intellectual property (IP). The proposed framework draws upon research in the …

Detecting malicious modifications of data in third-party intellectual property cores

J Rajendran, V Vedula, R Karri - … of the 52nd Annual Design Automation …, 2015 - dl.acm.org
Globalization of the system-on-chip (SoC) design flow has created opportunities for rogue
elements in the intellectual property (IP) vendor companies to insert malicious circuits (aka …

Netlist reverse engineering for high-level functionality reconstruction

T Meade, S Zhang, Y Jin - 2016 21st Asia and South Pacific …, 2016 - ieeexplore.ieee.org
In a modern IC design flow, from specification development to chip fabrication, various
security threats are emergent. Of particular concern are modifications made to third-party IP …

Hardware Trojan detection using ATPG and model checking

J Cruz, F Farahmandi, A Ahmed… - 2018 31st international …, 2018 - ieeexplore.ieee.org
The threat of hardware Trojans' existence in inte-gratedcircuits has become a major concern
in System-on-Chip (SoC) design industry as well as in military/defense organizations. There …