Ten years of hardware Trojans: a survey from the attacker's perspective

M Xue, C Gu, W Liu, S Yu… - IET Computers & Digital …, 2020 - Wiley Online Library
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …

EVHA: explainable vision system for hardware testing and assurance—An overview

MM Al Hasan, M Tahsin Mostafiz, T An Le… - ACM Journal on …, 2023 - dl.acm.org
Due to the ever-growing demands for electronic chips in different sectors, semiconductor
companies have been mandated to offshore their manufacturing processes. This unwanted …

TAAL: Tampering attack on any key-based logic locked circuits

A Jain, Z Zhou, U Guin - ACM Transactions on Design Automation of …, 2021 - dl.acm.org
Due to the globalization of semiconductor manufacturing and test processes, the system-on-
a-chip (SoC) designers no longer design the complete SoC and manufacture chips on their …

Effectiveness of HT-assisted sinkhole and blackhole denial of service attacks targeting mesh networks-on-chip

L Zhang, X Wang, Y Jiang, M Yang, T Mak… - Journal of Systems …, 2018 - Elsevier
There are ample opportunities at both design and manufacturing phases to meddle in a
many-core chip system, especially its underlining communication fabric, known as the …

A method to prevent hardware Trojans limiting access to layout resources

TM Supon, M Seyedbarhagh, R Rashidzadeh… - Microelectronics …, 2021 - Elsevier
Abstract The advancement of Integrated Circuit (IC) technology has encouraged the IC
industries to go fabless and outsource the fabrication to other companies, due to the cost …

Physical unclonable functions based hardware obfuscation techniques: a state of the art

H Kareem, D Dunaev - 2021 16th Iberian Conference on …, 2021 - ieeexplore.ieee.org
A clear majority of electronic devices applications used in our daily life require a reliable,
secure architecture, eg, healthcare, social security cards, electronic meters, and smart …

Analysis of hardware Trojan resilience enabled through logic locking

J Cruz, P Gaikwad, S Bhunia - 2022 Asian Hardware Oriented …, 2022 - ieeexplore.ieee.org
Emerging threats to hardware Intellectual Property (IP) confidentiality due to the horizontal
business model have come in the form of piracy, reverse engineering, and extraction of …

HLS-IRT: Hardware Trojan Insertion through Modification of Intermediate Representation During High-Level Synthesis

R Mukherjee, A Ghosh, RS Chakraborty - ACM Transactions on Design …, 2024 - dl.acm.org
Modern integrated circuit (IC) design incorporates the usage of proprietary computer-aided
design (CAD) software and integration of third-party hardware intellectual property (IP) …

On hardware-trojan-assisted power budgeting system attack targeting many core systems

Y Zhao, X Wang, Y Jiang, L Wang, M Yang… - Journal of Systems …, 2020 - Elsevier
In a modern many-core chip, as all the cores are constantly competing for their shares of
power out of the maximum power available to the chip, a sound power budgeting scheme is …

Logic Locking based Trojans: A Friend Turns Foe

Y Liu, A Jayasena, P Mishra, A Srivastava - arXiv preprint arXiv …, 2023 - arxiv.org
Logic locking and hardware Trojans are two fields in hardware security that have been
mostly developed independently from each other. In this paper, we identify the relationship …