Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models
Globalization trends in integrated circuit (IC) design are leading to increased vulnerability of
ICs against hardware Trojans (HT). Recently, several side channel parameters based …
ICs against hardware Trojans (HT). Recently, several side channel parameters based …
A self-learning framework to detect the intruded integrated circuits
Globalization trends in integrated circuit (IC) design using deep submicron (DSM)
technologies are leading to increased vulnerability of ICs against malicious intrusions …
technologies are leading to increased vulnerability of ICs against malicious intrusions …
MacLeR: machine learning-based runtime hardware trojan detection in resource-constrained IoT edge devices
Traditional learning-based approaches for runtime hardware Trojan (HT) detection require
complex and expensive on-chip data acquisition frameworks, and thus incur high area and …
complex and expensive on-chip data acquisition frameworks, and thus incur high area and …
Runtime hardware Trojan monitors through modeling burst mode communication using formal verification
Globalization trends in integrated circuit (IC) design using deep sub-micron (DSM)
technologies are leading to increased vulnerability against malicious intrusions. Various …
technologies are leading to increased vulnerability against malicious intrusions. Various …
Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors
SR Hasan, CA Kamhoua, KA Kwiat… - 2016 IEEE Asian …, 2016 - ieeexplore.ieee.org
It is a consensus among the researchers, although not proven, that it is close to impossible
to guarantee completely secure hardware design. Therefore, it is desired to have run-time …
to guarantee completely secure hardware design. Therefore, it is desired to have run-time …
Formal verification of gate-level multiple side channel parameters to detect hardware Trojans
The enhancements in functionality, performance, and complexity in modern electronics
systems have ensued the involvement of various entities, around the globe, in different …
systems have ensued the involvement of various entities, around the globe, in different …
Formal analysis of macro synchronous micro asychronous pipeline for hardware Trojan detection
Globalization trends in integrated circuit (IC) design using deep submicron (DSM)
technologies are leading to increased vulnerability of IC against malicious intrusions. These …
technologies are leading to increased vulnerability of IC against malicious intrusions. These …
SIMCom: Statistical sniffing of inter-module communications for runtime hardware trojan detection
Abstract Timely detection of Hardware Trojans (HTs) has become a major challenge for
secure integrated circuits. We present a run-time methodology for HT detection that employs …
secure integrated circuits. We present a run-time methodology for HT detection that employs …
Illegal Trojan design and detection in asynchronous NULL Convention Logic and Sleep Convention Logic circuits
KK Ponugoti, SK Srinivasan, SC Smith… - IET Computers & …, 2022 - Wiley Online Library
With Cyber warfare, detection of hardware Trojans, malicious digital circuit components that
can leak data and degrade performance, is an urgent issue. Quasi‐Delay Insensitive …
can leak data and degrade performance, is an urgent issue. Quasi‐Delay Insensitive …
Non-intrusive testing technique for detection of trojans in asynchronous circuits
LA Guimarães, TF de Paiva Leite… - … , Automation & Test …, 2018 - ieeexplore.ieee.org
Asynchronous circuits, as any IC, are vulnerable to hardware Trojans (HTs), which might be
maliciously implanted in IC designs during outsourced fabrication phases. In this paper, a …
maliciously implanted in IC designs during outsourced fabrication phases. In this paper, a …