Trojanzero: Switching activity-aware design of undetectable hardware trojans with zero power and area footprint
Conventional Hardware Trojan (HT) detection techniques are based on the validation of
integrated circuits to determine changes in their functionality, and on non-invasive side …
integrated circuits to determine changes in their functionality, and on non-invasive side …
SPARTA: A laser probing approach for trojan detection
Integrated circuits (ICs) fabricated at untrusted foundries are vulnerable to hardware Trojan
insertion. Trojans can be inserted into design files by modifying existing functionality or …
insertion. Trojans can be inserted into design files by modifying existing functionality or …
Efficient static power based side channel analysis for Hardware Trojan detection using controllable sleep transistors
NB Gunti, K Lingasubramanian - SoutheastCon 2015, 2015 - ieeexplore.ieee.org
Modern integrated circuits (ICs) are vulnerable to Hardware Trojans (HTs) due to the
globalization of semiconductor design and fabrication process. HT is an extra circuitry which …
globalization of semiconductor design and fabrication process. HT is an extra circuitry which …
Toward the Generation of Test Vectors for the Detection of Hardware Trojan Targeting Effective Switching Activity
Hardware Trojans (HTs) are small circuits intentionally designed by an adversary for harmful
purposes. These types of circuits are extremely difficult to detect. An HT often requires some …
purposes. These types of circuits are extremely difficult to detect. An HT often requires some …
Red team vs. blue team: a real-world hardware Trojan detection case study across four modern CMOS technology generations
Verifying the absence of maliciously inserted Trojans in Integrated Circuits (ICs) is a crucial
task–especially for security-enabled products. Depending on the concrete threat model …
task–especially for security-enabled products. Depending on the concrete threat model …
Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models
Globalization trends in integrated circuit (IC) design are leading to increased vulnerability of
ICs against hardware Trojans (HT). Recently, several side channel parameters based …
ICs against hardware Trojans (HT). Recently, several side channel parameters based …
Trojan-D2: Post-layout design and detection of stealthy hardware trojans-a RISC-V case study
With the exponential increase in the popularity of the RISC-V ecosystem, the security of this
platform must be re-evaluated especially for mission-critical and IoT devices. Besides, the …
platform must be re-evaluated especially for mission-critical and IoT devices. Besides, the …
Sequential hardware trojan: Side-channel aware design and placement
X Wang, S Narasimhan, A Krishna… - 2011 IEEE 29th …, 2011 - ieeexplore.ieee.org
Various design-for-security (DFS) approaches have been proposed earlier for detection of
hardware Trojans, which are malicious insertions in Integrated Circuits (ICs). In this paper …
hardware Trojans, which are malicious insertions in Integrated Circuits (ICs). In this paper …
Side-channel analysis for hardware Trojan detection using machine learning
S Yang, P Chakraborty, S Bhunia - 2021 IEEE International Test …, 2021 - ieeexplore.ieee.org
The evolving trend of the semiconductor supply chain resulted in a wide array of trust issues
for electronic hardware. Among them, malicious alteration of designs in an untrusted design …
for electronic hardware. Among them, malicious alteration of designs in an untrusted design …
Survey of recent developments for hardware trojan detection
The outsourcing of the design and manufacturing of Integrated Circuits (ICs) poses a severe
threat to our critical infrastructures as an adversary can exploit them by bypassing the …
threat to our critical infrastructures as an adversary can exploit them by bypassing the …