Ten years of hardware Trojans: a survey from the attacker's perspective

M Xue, C Gu, W Liu, S Yu… - IET Computers & Digital …, 2020 - Wiley Online Library
Hardware Trojan detection techniques have been studied extensively. However, to develop
reliable and effective defenses, it is important to figure out how hardware Trojans are …

Hardware security in IoT devices with emphasis on hardware trojans

S Sidhu, BJ Mohd, T Hayajneh - Journal of Sensor and Actuator Networks, 2019 - mdpi.com
Security of IoT devices is getting a lot of attention from researchers as they are becoming
prevalent everywhere. However, implementation of hardware security in these devices has …

Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain

U Guin, K Huang, D DiMase, JM Carulli… - Proceedings of the …, 2014 - ieeexplore.ieee.org
As the electronic component supply chain grows more complex due to globalization, with
parts coming from a diverse set of suppliers, counterfeit electronics have become a major …

Benchmarking of hardware trojans and maliciously affected circuits

B Shakya, T He, H Salmani, D Forte, S Bhunia… - Journal of Hardware and …, 2017 - Springer
Research in the field of hardware Trojans has seen significant growth in the past decade.
However, standard benchmarks to evaluate hardware Trojans and their detection are …

A survey of hardware trojan taxonomy and detection

M Tehranipoor, F Koushanfar - IEEE design & test of computers, 2010 - ieeexplore.ieee.org
A Survey of Hardware Trojan Taxonomy and Detection Page 1 A Survey of Hardware Trojan
Taxonomy and Detection Mohammad Tehranipoor University of Connecticut Farinaz …

COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist

H Salmani - IEEE Transactions on Information Forensics and …, 2016 - ieeexplore.ieee.org
This paper presents a novel hardware Trojan detection technique in gate-level netlist based
on the controllability and observability analyses. Using an unsupervised clustering analysis …

On design vulnerability analysis and trust benchmarks development

H Salmani, M Tehranipoor… - 2013 IEEE 31st …, 2013 - ieeexplore.ieee.org
The areas of hardware security and trust have experienced major growth over the past
several years. However, research in Trojan detection and prevention lacks standard …

VeriTrust: Verification for hardware trust

J Zhang, F Yuan, L Wei, Z Sun, Q Xu - Proceedings of the 50th Annual …, 2013 - dl.acm.org
Hardware Trojans (HTs) implemented by adversaries serve as backdoors to subvert or
augment the normal operation of infected devices, which may lead to functionality changes …

A novel technique for improving hardware trojan detection and reducing trojan activation time

H Salmani, M Tehranipoor… - IEEE transactions on very …, 2011 - ieeexplore.ieee.org
Fabless semiconductor industry and government agencies have raised serious concerns
about tampering with inserting hardware Trojans in an integrated circuit supply chain in …

Scalable test generation for Trojan detection using side channel analysis

Y Huang, S Bhunia, P Mishra - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Hardware Trojan detection has emerged as a critical challenge to ensure security and
trustworthiness of integrated circuits. A vast majority of research efforts in this area has …