An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

A primer on hardware security: Models, methods, and metrics

M Rostami, F Koushanfar, R Karri - Proceedings of the IEEE, 2014 - ieeexplore.ieee.org
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …

Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain

U Guin, K Huang, D DiMase, JM Carulli… - Proceedings of the …, 2014 - ieeexplore.ieee.org
As the electronic component supply chain grows more complex due to globalization, with
parts coming from a diverse set of suppliers, counterfeit electronics have become a major …

Benchmarking of hardware trojans and maliciously affected circuits

B Shakya, T He, H Salmani, D Forte, S Bhunia… - Journal of Hardware and …, 2017 - Springer
Research in the field of hardware Trojans has seen significant growth in the past decade.
However, standard benchmarks to evaluate hardware Trojans and their detection are …

On improving the security of logic locking

M Yasin, JJV Rajendran, O Sinanoglu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Due to globalization of integrated circuit (IC) design flow, rogue elements in the supply chain
can pirate ICs, overbuild ICs, and insert hardware Trojans. EPIC locks the design by …

Introduction to hardware security

Y Jin - Electronics, 2015 - mdpi.com
Hardware security has become a hot topic recently with more and more researchers from
related research domains joining this area. However, the understanding of hardware …

Security analysis of integrated circuit camouflaging

J Rajendran, M Sam, O Sinanoglu, R Karri - Proceedings of the 2013 …, 2013 - dl.acm.org
Camouflaging is a layout-level technique that hampers an attacker from reverse engineering
by introducing, in one embodiment, dummy contacts into the layout. By using a mix of real …

Double DIP: Re-evaluating security of logic encryption algorithms

Y Shen, H Zhou - Proceedings of the on Great Lakes Symposium on …, 2017 - dl.acm.org
Logic encryption is a hardware security technique that uses extra key inputs to lock a given
combinational circuit. A recent study by Subramanyan et al. shows that all existing logic …

A novel hardware logic encryption technique for thwarting illegal overproduction and hardware trojans

S Dupuis, PS Ba, G Di Natale… - 2014 IEEE 20th …, 2014 - ieeexplore.ieee.org
Hardware piracy is a threat that is becoming more and more serious these last years. The
different types of threats include mask theft, illegal overproduction, as well as the insertion of …

Cyclic obfuscation for creating SAT-unresolvable circuits

K Shamsi, M Li, T Meade, Z Zhao, DZ Pan… - Proceedings of the Great …, 2017 - dl.acm.org
Logic locking and IC camouflaging are proactive circuit obfuscation methods that if proven
secure can thwart hardware attacks such as reverse engineering and IP theft. However, the …