Fics-pcb: A multi-modal image dataset for automated printed circuit board visual inspection
Over the years, computer vision and machine learn-ing disciplines have considerably
advanced the field of automated visual inspection for Printed Circuit Board (PCB-AVI) …
advanced the field of automated visual inspection for Printed Circuit Board (PCB-AVI) …
The big hack explained: Detection and prevention of PCB supply chain implants
Over the past two decades, globalized outsourcing in the semiconductor supply chain has
lowered manufacturing costs and shortened the time-to-market for original equipment …
lowered manufacturing costs and shortened the time-to-market for original equipment …
Hardware trojan detection on a PCB through differential power monitoring
G Piliposyan, S Khursheed… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
There is a general consensus that contemporary electronics are at risk of cyber-attacks or
malicious modifications, such as Hardware Trojans (HT). This makes it crucial to develop …
malicious modifications, such as Hardware Trojans (HT). This makes it crucial to develop …
IOLock: An Input/Output Locking Scheme for Protection Against Reverse Engineering Attacks
Reverse engineering (RE) of hardware designs poses a significant threat to the modern
distributed electronics supply chain. RE can be performed at both chip and printed circuit …
distributed electronics supply chain. RE can be performed at both chip and printed circuit …
A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking
Z Mirmohammadi, S Etemadi Borujeni - Electronics, 2023 - mdpi.com
Effective resistance to intellectual property theft, reverse engineering, and hardware Trojan
insertion in integrated circuit supply chains is increasingly essential, for which many …
insertion in integrated circuit supply chains is increasingly essential, for which many …
SoK: A Security Architect's View of Printed Circuit Board Attacks
J Harrison, N Jessurun, M Tehranipoor - arXiv preprint arXiv:2410.09993, 2024 - arxiv.org
Many recent papers have proposed novel electrical measurements or physical inspection
technologies for defending printed circuit boards (PCBs) and printed circuit board …
technologies for defending printed circuit boards (PCBs) and printed circuit board …
PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans
Printed circuit Boards (PCBs) are becoming increasingly vulnerable to malicious design
alteration, also known as Trojan attacks, due to a distributed business model that often …
alteration, also known as Trojan attacks, due to a distributed business model that often …
Models for System-Level and Detection-Based Printed Circuit Board Attacks and Countermeasures
J Harrison - 2024 - search.proquest.com
To secure PCB assemblies, methods for detecting counterfeit components, malicious
modifications, and in-field tampering have been proposed. However, concerning trends …
modifications, and in-field tampering have been proposed. However, concerning trends …
[图书][B] Investigation into detection of hardware trojans on printed circuit boards
G Piliposyan - 2023 - search.proquest.com
The modern semiconductor device manufacturing flow is becoming increasingly vulnerable
to malicious implants called Hardware Trojans (HT). With HTs becoming stealthier a need …
to malicious implants called Hardware Trojans (HT). With HTs becoming stealthier a need …
Tamper Detection
Hardware is the root of trust for electronics security. Unfortunately, from intellectual property
theft and exploitation of hardware vulnerabilities to steal sensitive data, problems in …
theft and exploitation of hardware vulnerabilities to steal sensitive data, problems in …