Physical unclonable functions

Y Gao, SF Al-Sarawi, D Abbott - Nature Electronics, 2020 - nature.com
A physical unclonable function (PUF) is a device that exploits inherent randomness
introduced during manufacturing to give a physical entity a unique 'fingerprint'or trust anchor …

Survey of recent developments for hardware trojan detection

A Jain, Z Zhou, U Guin - 2021 ieee international symposium on …, 2021 - ieeexplore.ieee.org
The outsourcing of the design and manufacturing of Integrated Circuits (ICs) poses a severe
threat to our critical infrastructures as an adversary can exploit them by bypassing the …

Brain-inspired golden chip free hardware trojan detection

S Faezi, R Yasaei, A Barua… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Since 2007, the use of side-channel measurements for detecting Hardware Trojan (HT) has
been extensively studied. However, the majority of works either rely on a golden chip, or …

[HTML][HTML] Hardware trojans in chips: A survey for detection and prevention

C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen - Sensors, 2020 - mdpi.com
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …

Attrition: Attacking static hardware trojan detection techniques using reinforcement learning

V Gohil, H Guo, S Patnaik, J Rajendran - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Stealthy hardware Trojans (HTs) inserted during the fabrication of integrated circuits can
bypass the security of critical infrastructures. Although researchers have proposed many …

A survey on risc-v security: Hardware and architecture

T Lu - arXiv preprint arXiv:2107.04175, 2021 - arxiv.org
The Internet of Things (IoT) is an ongoing technological revolution. Embedded processors
are the processing engines of smart IoT devices. For decades, these processors were …

Scalable activation of rare triggers in hardware trojans by repeated maximal clique sampling

Y Lyu, P Mishra - … Transactions on Computer-Aided Design of …, 2020 - ieeexplore.ieee.org
Hardware Trojans are serious threat to security and reliability of computing systems. It is
hard to detect these malicious implants using traditional validation methods since an …

Creating a backscattering side channel to enable detection of dormant hardware trojans

LN Nguyen, CL Cheng, M Prvulovic… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
This paper describes a new physical side channel, ie, the backscattering side channel,
created by transmitting a signal toward the integrated circuits (ICs), where the internal …

Hardware trojan detection using unsupervised deep learning on quantum diamond microscope magnetic field images

M Ashok, MJ Turner, RL Walsworth, EV Levine… - ACM Journal on …, 2022 - dl.acm.org
This article presents a method for hardware trojan detection in integrated circuits.
Unsupervised deep learning is used to classify wide field-of-view (4× 4 mm2), high spatial …

REMOTE: Robust external malware detection framework by using electromagnetic signals

N Sehatbakhsh, A Nazari, M Alam… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are controlling many critical and sensitive aspects of our
physical world while being continuously exposed to potential cyber-attacks. These systems …