Trojanzero: Switching activity-aware design of undetectable hardware trojans with zero power and area footprint

IH Abbassi, F Khalid, S Rehman… - … , Automation & Test …, 2019 - ieeexplore.ieee.org
Conventional Hardware Trojan (HT) detection techniques are based on the validation of
integrated circuits to determine changes in their functionality, and on non-invasive side …

SPARTA: A laser probing approach for trojan detection

A Stern, D Mehta, S Tajik, F Farahmandi… - … test conference (ITC …, 2020 - ieeexplore.ieee.org
Integrated circuits (ICs) fabricated at untrusted foundries are vulnerable to hardware Trojan
insertion. Trojans can be inserted into design files by modifying existing functionality or …

Efficient static power based side channel analysis for Hardware Trojan detection using controllable sleep transistors

NB Gunti, K Lingasubramanian - SoutheastCon 2015, 2015 - ieeexplore.ieee.org
Modern integrated circuits (ICs) are vulnerable to Hardware Trojans (HTs) due to the
globalization of semiconductor design and fabrication process. HT is an extra circuitry which …

Toward the Generation of Test Vectors for the Detection of Hardware Trojan Targeting Effective Switching Activity

A Mondal, D Kalita, A Ghosh, S Roy, B Sen - ACM Journal on Emerging …, 2023 - dl.acm.org
Hardware Trojans (HTs) are small circuits intentionally designed by an adversary for harmful
purposes. These types of circuits are extremely difficult to detect. An HT often requires some …

Red team vs. blue team: a real-world hardware Trojan detection case study across four modern CMOS technology generations

E Puschner, T Moos, S Becker, C Kison… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Verifying the absence of maliciously inserted Trojans in Integrated Circuits (ICs) is a crucial
task–especially for security-enabled products. Depending on the concrete threat model …

Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models

FK Lodhi, SR Hasan, O Hasan… - Design, Automation & …, 2017 - ieeexplore.ieee.org
Globalization trends in integrated circuit (IC) design are leading to increased vulnerability of
ICs against hardware Trojans (HT). Recently, several side channel parameters based …

Trojan-D2: Post-layout design and detection of stealthy hardware trojans-a RISC-V case study

S Parvin, M Goli, FS Torres, R Drechsler - … of the 28th Asia and South …, 2023 - dl.acm.org
With the exponential increase in the popularity of the RISC-V ecosystem, the security of this
platform must be re-evaluated especially for mission-critical and IoT devices. Besides, the …

Sequential hardware trojan: Side-channel aware design and placement

X Wang, S Narasimhan, A Krishna… - 2011 IEEE 29th …, 2011 - ieeexplore.ieee.org
Various design-for-security (DFS) approaches have been proposed earlier for detection of
hardware Trojans, which are malicious insertions in Integrated Circuits (ICs). In this paper …

Side-channel analysis for hardware Trojan detection using machine learning

S Yang, P Chakraborty, S Bhunia - 2021 IEEE International Test …, 2021 - ieeexplore.ieee.org
The evolving trend of the semiconductor supply chain resulted in a wide array of trust issues
for electronic hardware. Among them, malicious alteration of designs in an untrusted design …

Survey of recent developments for hardware trojan detection

A Jain, Z Zhou, U Guin - 2021 ieee international symposium on …, 2021 - ieeexplore.ieee.org
The outsourcing of the design and manufacturing of Integrated Circuits (ICs) poses a severe
threat to our critical infrastructures as an adversary can exploit them by bypassing the …