Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models
Globalization trends in integrated circuit (IC) design are leading to increased vulnerability of
ICs against hardware Trojans (HT). Recently, several side channel parameters based …
ICs against hardware Trojans (HT). Recently, several side channel parameters based …
Red team vs. blue team: a real-world hardware Trojan detection case study across four modern CMOS technology generations
Verifying the absence of maliciously inserted Trojans in Integrated Circuits (ICs) is a crucial
task–especially for security-enabled products. Depending on the concrete threat model …
task–especially for security-enabled products. Depending on the concrete threat model …
Htnet: Transfer learning for golden chip-free hardware trojan detection
S Faezi, R Yasaei… - 2021 Design, Automation & …, 2021 - ieeexplore.ieee.org
Design and fabrication outsourcing has made integrated circuits (IC) vulnerable to malicious
modifications by third parties known as hardware Trojans (HT). Over the last decade, the use …
modifications by third parties known as hardware Trojans (HT). Over the last decade, the use …
Hardware trojans detection at register transfer level based on machine learning
T Han, Y Wang, P Liu - 2019 IEEE International Symposium on …, 2019 - ieeexplore.ieee.org
To accurately detect Hardware Trojans in integrated circuits design process, a machine-
learning-based detection method at the register transfer level (RTL) is proposed. In this …
learning-based detection method at the register transfer level (RTL) is proposed. In this …
Golden gates: A new hybrid approach for rapid hardware trojan detection using testing and imaging
Hardware Trojans are malicious modifications on integrated circuits (IC), which pose a grave
threat to the security of modern military and commercial systems. Existing methods of …
threat to the security of modern military and commercial systems. Existing methods of …
SPARTA: A laser probing approach for trojan detection
Integrated circuits (ICs) fabricated at untrusted foundries are vulnerable to hardware Trojan
insertion. Trojans can be inserted into design files by modifying existing functionality or …
insertion. Trojans can be inserted into design files by modifying existing functionality or …
An unsupervised detection approach for hardware trojans
With the booming development of the cyber-physical system, human society is much more
dependent on information technology. Unfortunately, like software, hardware is not trusted at …
dependent on information technology. Unfortunately, like software, hardware is not trusted at …
Hardware Trojan detection using ATPG and model checking
The threat of hardware Trojans' existence in inte-gratedcircuits has become a major concern
in System-on-Chip (SoC) design industry as well as in military/defense organizations. There …
in System-on-Chip (SoC) design industry as well as in military/defense organizations. There …
Introduction to hardware Trojan detection methods
J Francq, F Frick - 2015 Design, Automation & Test in Europe …, 2015 - ieeexplore.ieee.org
Hardware Trojans (HTs) are identified as an emerging threat for the integrity of Integrated
Circuits (ICs) and their applications. Attackers attempt to maliciously manipulate the …
Circuits (ICs) and their applications. Attackers attempt to maliciously manipulate the …
Hardware trojan detection using graph neural networks
The globalization of the Integrated Circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third party …
fabrication, and testing process from a single trusted entity to various untrusted third party …