Physical unclonable functions
A physical unclonable function (PUF) is a device that exploits inherent randomness
introduced during manufacturing to give a physical entity a unique 'fingerprint'or trust anchor …
introduced during manufacturing to give a physical entity a unique 'fingerprint'or trust anchor …
Survey of recent developments for hardware trojan detection
The outsourcing of the design and manufacturing of Integrated Circuits (ICs) poses a severe
threat to our critical infrastructures as an adversary can exploit them by bypassing the …
threat to our critical infrastructures as an adversary can exploit them by bypassing the …
Brain-inspired golden chip free hardware trojan detection
Since 2007, the use of side-channel measurements for detecting Hardware Trojan (HT) has
been extensively studied. However, the majority of works either rely on a golden chip, or …
been extensively studied. However, the majority of works either rely on a golden chip, or …
[HTML][HTML] Hardware trojans in chips: A survey for detection and prevention
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …
Attrition: Attacking static hardware trojan detection techniques using reinforcement learning
Stealthy hardware Trojans (HTs) inserted during the fabrication of integrated circuits can
bypass the security of critical infrastructures. Although researchers have proposed many …
bypass the security of critical infrastructures. Although researchers have proposed many …
A survey on risc-v security: Hardware and architecture
T Lu - arXiv preprint arXiv:2107.04175, 2021 - arxiv.org
The Internet of Things (IoT) is an ongoing technological revolution. Embedded processors
are the processing engines of smart IoT devices. For decades, these processors were …
are the processing engines of smart IoT devices. For decades, these processors were …
Scalable activation of rare triggers in hardware trojans by repeated maximal clique sampling
Hardware Trojans are serious threat to security and reliability of computing systems. It is
hard to detect these malicious implants using traditional validation methods since an …
hard to detect these malicious implants using traditional validation methods since an …
Creating a backscattering side channel to enable detection of dormant hardware trojans
This paper describes a new physical side channel, ie, the backscattering side channel,
created by transmitting a signal toward the integrated circuits (ICs), where the internal …
created by transmitting a signal toward the integrated circuits (ICs), where the internal …
Hardware trojan detection using unsupervised deep learning on quantum diamond microscope magnetic field images
M Ashok, MJ Turner, RL Walsworth, EV Levine… - ACM Journal on …, 2022 - dl.acm.org
This article presents a method for hardware trojan detection in integrated circuits.
Unsupervised deep learning is used to classify wide field-of-view (4× 4 mm2), high spatial …
Unsupervised deep learning is used to classify wide field-of-view (4× 4 mm2), high spatial …
REMOTE: Robust external malware detection framework by using electromagnetic signals
Cyber-physical systems (CPS) are controlling many critical and sensitive aspects of our
physical world while being continuously exposed to potential cyber-attacks. These systems …
physical world while being continuously exposed to potential cyber-attacks. These systems …