Ten years of hardware Trojans: a survey from the attacker's perspective
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …
reliable and effective defenses, it is important to figure out how hardware Trojans are …
Hardware Trojan attacks: Threat analysis and countermeasures
Security of a computer system has been traditionally related to the security of the software or
the information being processed. The underlying hardware used for information processing …
the information being processed. The underlying hardware used for information processing …
Benchmarking of hardware trojans and maliciously affected circuits
Research in the field of hardware Trojans has seen significant growth in the past decade.
However, standard benchmarks to evaluate hardware Trojans and their detection are …
However, standard benchmarks to evaluate hardware Trojans and their detection are …
Introduction to hardware security
Y Jin - Electronics, 2015 - mdpi.com
Hardware security has become a hot topic recently with more and more researchers from
related research domains joining this area. However, the understanding of hardware …
related research domains joining this area. However, the understanding of hardware …
COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist
H Salmani - IEEE Transactions on Information Forensics and …, 2016 - ieeexplore.ieee.org
This paper presents a novel hardware Trojan detection technique in gate-level netlist based
on the controllability and observability analyses. Using an unsupervised clustering analysis …
on the controllability and observability analyses. Using an unsupervised clustering analysis …
Case study: Detecting hardware Trojans in third-party digital IP cores
X Zhang, M Tehranipoor - 2011 IEEE International Symposium …, 2011 - ieeexplore.ieee.org
The intellectual property (IP) blocks are designed by hundreds of IP vendors distributed
across the world. Such IPs cannot be assumed trusted as hardware Trojans can be …
across the world. Such IPs cannot be assumed trusted as hardware Trojans can be …
Proof-carrying hardware intellectual property: A pathway to trusted module acquisition
We present a novel framework for facilitating the acquisition of provably trustworthy
hardware intellectual property (IP). The proposed framework draws upon research in the …
hardware intellectual property (IP). The proposed framework draws upon research in the …
Detecting malicious modifications of data in third-party intellectual property cores
Globalization of the system-on-chip (SoC) design flow has created opportunities for rogue
elements in the intellectual property (IP) vendor companies to insert malicious circuits (aka …
elements in the intellectual property (IP) vendor companies to insert malicious circuits (aka …
Netlist reverse engineering for high-level functionality reconstruction
In a modern IC design flow, from specification development to chip fabrication, various
security threats are emergent. Of particular concern are modifications made to third-party IP …
security threats are emergent. Of particular concern are modifications made to third-party IP …
Hardware Trojan detection using ATPG and model checking
The threat of hardware Trojans' existence in inte-gratedcircuits has become a major concern
in System-on-Chip (SoC) design industry as well as in military/defense organizations. There …
in System-on-Chip (SoC) design industry as well as in military/defense organizations. There …