Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives

UJ Botero, R Wilson, H Lu, MT Rahman… - ACM Journal on …, 2021 - dl.acm.org
In the context of hardware trust and assurance, reverse engineering has been often
considered as an illegal action. Generally speaking, reverse engineering aims to retrieve …

Defense-in-depth: A recipe for logic locking to prevail

MT Rahman, MS Rahman, H Wang, S Tajik, W Khalil… - Integration, 2020 - Elsevier
Logic locking/obfuscation has emerged as an auspicious solution for protecting the
semiconductor intellectual property (IP) from the untrusted entities in the design and …

Survey of recent developments for hardware trojan detection

A Jain, Z Zhou, U Guin - 2021 ieee international symposium on …, 2021 - ieeexplore.ieee.org
The outsourcing of the design and manufacturing of Integrated Circuits (ICs) poses a severe
threat to our critical infrastructures as an adversary can exploit them by bypassing the …

Toshi-towards secure heterogeneous integration: Security risks, threat assessment, and assurance

N Vashistha, ML Rahman, MSU Haque… - Cryptology ePrint …, 2022 - eprint.iacr.org
The semiconductor industry is entering a new age in which device scaling and cost
reduction will no longer follow the decades-long pattern. Packing more transistors on a …

Detecting hardware Trojans using combined self-testing and imaging

N Vashistha, H Lu, Q Shi, DL Woodard… - … on Computer-Aided …, 2021 - ieeexplore.ieee.org
Hardware Trojans are malicious modifications in integrated circuits (ICs) with an intent to
breach security and compromise the reliability of an electronic system. This article proposes …

Risk-aware and explainable framework for ensuring guaranteed coverage in evolving hardware Trojan detection

R Vishwakarma, A Rezaei - 2023 IEEE/ACM International …, 2023 - ieeexplore.ieee.org
As the semiconductor industry has shifted to a fabless paradigm, the risk of hardware
Trojans being inserted at various stages of production has also increased. Recently, there …

A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention

R Mukherjee, SR Rajendran… - Journal of Cryptographic …, 2022 - Springer
Hardware Trojans have emerged as a great threat to the trustability of modern electronic
systems. A deployed electronic system with one or more undetected Hardware Trojan …

Robust hardware trojan detection method by unsupervised learning of electromagnetic signals

D Lee, J Lee, Y Jung, J Kauh… - IEEE Transactions on Very …, 2024 - ieeexplore.ieee.org
This article explores the threat posed by Hardware Trojans (HTs), malicious circuits
clandestinely embedded in hardware akin to software backdoors. Activation by attackers …

Is backside the new backdoor in modern socs?

N Vashistha, MT Rahman… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Modern integrated circuits (ICs) possess several countermeasures to safeguard sensitive
data and information stored in the device. In recent years, semi-invasive physical attacks …

Two sides of the same coin: Boons and banes of machine learning in hardware security

W Liu, CH Chang, X Wang, C Liu… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
The last decade has witnessed remarkable research advances at the intersection of
machine learning (ML) and hardware security. The confluence of the two technologies has …