Conventional and machine learning approaches as countermeasures against hardware trojan attacks
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …
increasing at a steady pace. This rapid development drives the technology companies to …
A2: Analog malicious hardware
While the move to smaller transistors has been a boon for performance it has dramatically
increased the cost to fabricate chips using those smaller transistors. This forces the vast …
increased the cost to fabricate chips using those smaller transistors. This forces the vast …
Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks
Logic locking has emerged as a promising technique for protecting gate-level
semiconductor intellectual property. However, recent work has shown that such gate-level …
semiconductor intellectual property. However, recent work has shown that such gate-level …
A survey of hardware Trojan threat and defense
Abstract Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with
various means to steal the internal sensitive data or modify original functionality, which may …
various means to steal the internal sensitive data or modify original functionality, which may …
Protect your chip design intellectual property: An overview
The increasing cost of integrated circuit (IC) fabrication has driven most companies to" go
fabless" over time. The corresponding outsourcing trend gave rise to various attack vectors …
fabless" over time. The corresponding outsourcing trend gave rise to various attack vectors …
Robust design-for-security architecture for enabling trust in IC manufacturing and test
Due to the prohibitive costs of semiconductor manufacturing, most system-on-chip design
companies outsource their production to offshore foundries. As most of these devices are …
companies outsource their production to offshore foundries. As most of these devices are …
Building trusted ICs using split fabrication
Due to escalating manufacturing costs the latest and most advanced semiconductor
technologies are often available at off-shore foundries. Utilizing these facilities significantly …
technologies are often available at off-shore foundries. Utilizing these facilities significantly …
The cat and mouse in split manufacturing
Split manufacturing of integrated circuits eliminates vulnerabilities introduced by an
untrusted foundry by manufacturing only a part of design at an untrusted high-end foundry …
untrusted foundry by manufacturing only a part of design at an untrusted high-end foundry …
TPAD: Hardware Trojan prevention and detection for trusted integrated circuits
There are increasing concerns about possible malicious modifications of integrated circuits
(ICs) used in critical applications. Such attacks are often referred to as hardware Trojans …
(ICs) used in critical applications. Such attacks are often referred to as hardware Trojans …
Regaining trust in VLSI design: Design-for-trust techniques
Designers use third-party intellectual property (IP) cores and outsource various steps in their
integrated circuit (IC) design flow, including fabrication. As a result, security vulnerabilities …
integrated circuit (IC) design flow, including fabrication. As a result, security vulnerabilities …