An overview of hardware security and trust: Threats, countermeasures, and design tools
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
A primer on hardware security: Models, methods, and metrics
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …
Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain
As the electronic component supply chain grows more complex due to globalization, with
parts coming from a diverse set of suppliers, counterfeit electronics have become a major …
parts coming from a diverse set of suppliers, counterfeit electronics have become a major …
Benchmarking of hardware trojans and maliciously affected circuits
Research in the field of hardware Trojans has seen significant growth in the past decade.
However, standard benchmarks to evaluate hardware Trojans and their detection are …
However, standard benchmarks to evaluate hardware Trojans and their detection are …
On improving the security of logic locking
Due to globalization of integrated circuit (IC) design flow, rogue elements in the supply chain
can pirate ICs, overbuild ICs, and insert hardware Trojans. EPIC locks the design by …
can pirate ICs, overbuild ICs, and insert hardware Trojans. EPIC locks the design by …
Introduction to hardware security
Y Jin - Electronics, 2015 - mdpi.com
Hardware security has become a hot topic recently with more and more researchers from
related research domains joining this area. However, the understanding of hardware …
related research domains joining this area. However, the understanding of hardware …
Security analysis of integrated circuit camouflaging
Camouflaging is a layout-level technique that hampers an attacker from reverse engineering
by introducing, in one embodiment, dummy contacts into the layout. By using a mix of real …
by introducing, in one embodiment, dummy contacts into the layout. By using a mix of real …
Double DIP: Re-evaluating security of logic encryption algorithms
Logic encryption is a hardware security technique that uses extra key inputs to lock a given
combinational circuit. A recent study by Subramanyan et al. shows that all existing logic …
combinational circuit. A recent study by Subramanyan et al. shows that all existing logic …
A novel hardware logic encryption technique for thwarting illegal overproduction and hardware trojans
S Dupuis, PS Ba, G Di Natale… - 2014 IEEE 20th …, 2014 - ieeexplore.ieee.org
Hardware piracy is a threat that is becoming more and more serious these last years. The
different types of threats include mask theft, illegal overproduction, as well as the insertion of …
different types of threats include mask theft, illegal overproduction, as well as the insertion of …
Cyclic obfuscation for creating SAT-unresolvable circuits
Logic locking and IC camouflaging are proactive circuit obfuscation methods that if proven
secure can thwart hardware attacks such as reverse engineering and IP theft. However, the …
secure can thwart hardware attacks such as reverse engineering and IP theft. However, the …