Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models

FK Lodhi, SR Hasan, O Hasan… - Design, Automation & …, 2017 - ieeexplore.ieee.org
Globalization trends in integrated circuit (IC) design are leading to increased vulnerability of
ICs against hardware Trojans (HT). Recently, several side channel parameters based …

Red team vs. blue team: a real-world hardware Trojan detection case study across four modern CMOS technology generations

E Puschner, T Moos, S Becker, C Kison… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Verifying the absence of maliciously inserted Trojans in Integrated Circuits (ICs) is a crucial
task–especially for security-enabled products. Depending on the concrete threat model …

Htnet: Transfer learning for golden chip-free hardware trojan detection

S Faezi, R Yasaei… - 2021 Design, Automation & …, 2021 - ieeexplore.ieee.org
Design and fabrication outsourcing has made integrated circuits (IC) vulnerable to malicious
modifications by third parties known as hardware Trojans (HT). Over the last decade, the use …

Hardware trojans detection at register transfer level based on machine learning

T Han, Y Wang, P Liu - 2019 IEEE International Symposium on …, 2019 - ieeexplore.ieee.org
To accurately detect Hardware Trojans in integrated circuits design process, a machine-
learning-based detection method at the register transfer level (RTL) is proposed. In this …

Golden gates: A new hybrid approach for rapid hardware trojan detection using testing and imaging

Q Shi, N Vashistha, H Lu, H Shen… - … oriented security and …, 2019 - ieeexplore.ieee.org
Hardware Trojans are malicious modifications on integrated circuits (IC), which pose a grave
threat to the security of modern military and commercial systems. Existing methods of …

SPARTA: A laser probing approach for trojan detection

A Stern, D Mehta, S Tajik, F Farahmandi… - … test conference (ITC …, 2020 - ieeexplore.ieee.org
Integrated circuits (ICs) fabricated at untrusted foundries are vulnerable to hardware Trojan
insertion. Trojans can be inserted into design files by modifying existing functionality or …

An unsupervised detection approach for hardware trojans

C Dong, Y Liu, J Chen, X Liu, W Guo, Y Chen - IEEE Access, 2020 - ieeexplore.ieee.org
With the booming development of the cyber-physical system, human society is much more
dependent on information technology. Unfortunately, like software, hardware is not trusted at …

Hardware Trojan detection using ATPG and model checking

J Cruz, F Farahmandi, A Ahmed… - 2018 31st international …, 2018 - ieeexplore.ieee.org
The threat of hardware Trojans' existence in inte-gratedcircuits has become a major concern
in System-on-Chip (SoC) design industry as well as in military/defense organizations. There …

Introduction to hardware Trojan detection methods

J Francq, F Frick - 2015 Design, Automation & Test in Europe …, 2015 - ieeexplore.ieee.org
Hardware Trojans (HTs) are identified as an emerging threat for the integrity of Integrated
Circuits (ICs) and their applications. Attackers attempt to maliciously manipulate the …

Hardware trojan detection using graph neural networks

R Yasaei, L Chen, SY Yu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The globalization of the Integrated Circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third party …