Ten years of hardware Trojans: a survey from the attacker's perspective
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …
reliable and effective defenses, it is important to figure out how hardware Trojans are …
EVHA: explainable vision system for hardware testing and assurance—An overview
MM Al Hasan, M Tahsin Mostafiz, T An Le… - ACM Journal on …, 2023 - dl.acm.org
Due to the ever-growing demands for electronic chips in different sectors, semiconductor
companies have been mandated to offshore their manufacturing processes. This unwanted …
companies have been mandated to offshore their manufacturing processes. This unwanted …
TAAL: Tampering attack on any key-based logic locked circuits
Due to the globalization of semiconductor manufacturing and test processes, the system-on-
a-chip (SoC) designers no longer design the complete SoC and manufacture chips on their …
a-chip (SoC) designers no longer design the complete SoC and manufacture chips on their …
Effectiveness of HT-assisted sinkhole and blackhole denial of service attacks targeting mesh networks-on-chip
There are ample opportunities at both design and manufacturing phases to meddle in a
many-core chip system, especially its underlining communication fabric, known as the …
many-core chip system, especially its underlining communication fabric, known as the …
A method to prevent hardware Trojans limiting access to layout resources
TM Supon, M Seyedbarhagh, R Rashidzadeh… - Microelectronics …, 2021 - Elsevier
Abstract The advancement of Integrated Circuit (IC) technology has encouraged the IC
industries to go fabless and outsource the fabrication to other companies, due to the cost …
industries to go fabless and outsource the fabrication to other companies, due to the cost …
Physical unclonable functions based hardware obfuscation techniques: a state of the art
A clear majority of electronic devices applications used in our daily life require a reliable,
secure architecture, eg, healthcare, social security cards, electronic meters, and smart …
secure architecture, eg, healthcare, social security cards, electronic meters, and smart …
Analysis of hardware Trojan resilience enabled through logic locking
Emerging threats to hardware Intellectual Property (IP) confidentiality due to the horizontal
business model have come in the form of piracy, reverse engineering, and extraction of …
business model have come in the form of piracy, reverse engineering, and extraction of …
HLS-IRT: Hardware Trojan Insertion through Modification of Intermediate Representation During High-Level Synthesis
Modern integrated circuit (IC) design incorporates the usage of proprietary computer-aided
design (CAD) software and integration of third-party hardware intellectual property (IP) …
design (CAD) software and integration of third-party hardware intellectual property (IP) …
On hardware-trojan-assisted power budgeting system attack targeting many core systems
In a modern many-core chip, as all the cores are constantly competing for their shares of
power out of the maximum power available to the chip, a sound power budgeting scheme is …
power out of the maximum power available to the chip, a sound power budgeting scheme is …
Logic Locking based Trojans: A Friend Turns Foe
Logic locking and hardware Trojans are two fields in hardware security that have been
mostly developed independently from each other. In this paper, we identify the relationship …
mostly developed independently from each other. In this paper, we identify the relationship …