Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models

FK Lodhi, SR Hasan, O Hasan… - Design, Automation & …, 2017 - ieeexplore.ieee.org
Globalization trends in integrated circuit (IC) design are leading to increased vulnerability of
ICs against hardware Trojans (HT). Recently, several side channel parameters based …

A self-learning framework to detect the intruded integrated circuits

FK Lodhi, I Abbasi, F Khalid, O Hasan… - … on Circuits and …, 2016 - ieeexplore.ieee.org
Globalization trends in integrated circuit (IC) design using deep submicron (DSM)
technologies are leading to increased vulnerability of ICs against malicious intrusions …

MacLeR: machine learning-based runtime hardware trojan detection in resource-constrained IoT edge devices

F Khalid, SR Hasan, S Zia, O Hasan… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Traditional learning-based approaches for runtime hardware Trojan (HT) detection require
complex and expensive on-chip data acquisition frameworks, and thus incur high area and …

Runtime hardware Trojan monitors through modeling burst mode communication using formal verification

F Khalid, SR Hasan, O Hasan, F Awwad - Integration, 2018 - Elsevier
Globalization trends in integrated circuit (IC) design using deep sub-micron (DSM)
technologies are leading to increased vulnerability against malicious intrusions. Various …

Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors

SR Hasan, CA Kamhoua, KA Kwiat… - 2016 IEEE Asian …, 2016 - ieeexplore.ieee.org
It is a consensus among the researchers, although not proven, that it is close to impossible
to guarantee completely secure hardware design. Therefore, it is desired to have run-time …

Formal verification of gate-level multiple side channel parameters to detect hardware Trojans

IH Abbasi, FK Lodhi, AM Kamboh, O Hasan - Formal Techniques for Safety …, 2017 - Springer
The enhancements in functionality, performance, and complexity in modern electronics
systems have ensued the involvement of various entities, around the globe, in different …

Formal analysis of macro synchronous micro asychronous pipeline for hardware Trojan detection

FK Lodhi, SR Hasan, O Hasan… - 2015 Nordic Circuits and …, 2015 - ieeexplore.ieee.org
Globalization trends in integrated circuit (IC) design using deep submicron (DSM)
technologies are leading to increased vulnerability of IC against malicious intrusions. These …

SIMCom: Statistical sniffing of inter-module communications for runtime hardware trojan detection

F Khalid, SR Hasan, O Hasan, M Shafique - Microprocessors and …, 2020 - Elsevier
Abstract Timely detection of Hardware Trojans (HTs) has become a major challenge for
secure integrated circuits. We present a run-time methodology for HT detection that employs …

Illegal Trojan design and detection in asynchronous NULL Convention Logic and Sleep Convention Logic circuits

KK Ponugoti, SK Srinivasan, SC Smith… - IET Computers & …, 2022 - Wiley Online Library
With Cyber warfare, detection of hardware Trojans, malicious digital circuit components that
can leak data and degrade performance, is an urgent issue. Quasi‐Delay Insensitive …

Non-intrusive testing technique for detection of trojans in asynchronous circuits

LA Guimarães, TF de Paiva Leite… - … , Automation & Test …, 2018 - ieeexplore.ieee.org
Asynchronous circuits, as any IC, are vulnerable to hardware Trojans (HTs), which might be
maliciously implanted in IC designs during outsourced fabrication phases. In this paper, a …