Conventional and machine learning approaches as countermeasures against hardware trojan attacks

KG Liakos, GK Georgakilas, S Moustakidis… - Microprocessors and …, 2020 - Elsevier
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …

A2: Analog malicious hardware

K Yang, M Hicks, Q Dong, T Austin… - 2016 IEEE symposium …, 2016 - ieeexplore.ieee.org
While the move to smaller transistors has been a boon for performance it has dramatically
increased the cost to fabricate chips using those smaller transistors. This forces the vast …

Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks

X Xu, B Shakya, MM Tehranipoor, D Forte - Cryptographic Hardware and …, 2017 - Springer
Logic locking has emerged as a promising technique for protecting gate-level
semiconductor intellectual property. However, recent work has shown that such gate-level …

A survey of hardware Trojan threat and defense

H Li, Q Liu, J Zhang - Integration, 2016 - Elsevier
Abstract Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with
various means to steal the internal sensitive data or modify original functionality, which may …

Protect your chip design intellectual property: An overview

J Knechtel, S Patnaik, O Sinanoglu - Proceedings of the International …, 2019 - dl.acm.org
The increasing cost of integrated circuit (IC) fabrication has driven most companies to" go
fabless" over time. The corresponding outsourcing trend gave rise to various attack vectors …

Robust design-for-security architecture for enabling trust in IC manufacturing and test

U Guin, Z Zhou, A Singh - … on Very Large Scale Integration (VLSI …, 2018 - ieeexplore.ieee.org
Due to the prohibitive costs of semiconductor manufacturing, most system-on-chip design
companies outsource their production to offshore foundries. As most of these devices are …

Building trusted ICs using split fabrication

K Vaidyanathan, BP Das, E Sumbul… - … on hardware-oriented …, 2014 - ieeexplore.ieee.org
Due to escalating manufacturing costs the latest and most advanced semiconductor
technologies are often available at off-shore foundries. Utilizing these facilities significantly …

The cat and mouse in split manufacturing

Y Wang, P Chen, J Hu, J Rajendran - Proceedings of the 53rd Annual …, 2016 - dl.acm.org
Split manufacturing of integrated circuits eliminates vulnerabilities introduced by an
untrusted foundry by manufacturing only a part of design at an untrusted high-end foundry …

TPAD: Hardware Trojan prevention and detection for trusted integrated circuits

TF Wu, K Ganesan, YA Hu, HSP Wong… - … on Computer-Aided …, 2015 - ieeexplore.ieee.org
There are increasing concerns about possible malicious modifications of integrated circuits
(ICs) used in critical applications. Such attacks are often referred to as hardware Trojans …

Regaining trust in VLSI design: Design-for-trust techniques

J Rajendran, O Sinanoglu, R Karri - Proceedings of the IEEE, 2014 - ieeexplore.ieee.org
Designers use third-party intellectual property (IP) cores and outsource various steps in their
integrated circuit (IC) design flow, including fabrication. As a result, security vulnerabilities …